{"vulnerability": "CVE-2024-1104", "sightings": [{"uuid": "7de822c6-2557-4591-9ac5-cd0ed81dfd3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11048", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113452044962191469", "content": "", "creation_timestamp": "2024-11-09T08:27:03.166857Z"}, {"uuid": "1fbdcd1c-1454-4e29-ae3f-3c1694022ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11046", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113456478017963703", "content": "", "creation_timestamp": "2024-11-10T03:14:26.313542Z"}, {"uuid": "f7f2b8af-99d9-4ee2-97be-fb309b355b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11048", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113456663237722768", "content": "", "creation_timestamp": "2024-11-10T04:01:32.621073Z"}, {"uuid": "0d6253e3-81d1-4a9e-8bea-0ab4045848b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11049", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113457047359985985", "content": "", "creation_timestamp": "2024-11-10T05:39:13.799298Z"}, {"uuid": "774caace-1f68-4e2a-8cf2-f0c20fb4d47c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11040", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11843", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11040\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-03-20T10:10:55.762Z\n\ud83d\udccf Modified: 2025-04-15T15:53:31.930Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-04-15T15:54:33.000000Z"}, {"uuid": "f9985919-9afb-4d1e-96d3-46ed5db5d460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11044", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-11044.yaml", "content": "", "creation_timestamp": "2025-01-22T13:42:32.000000Z"}, {"uuid": "77e7235e-f61f-4563-90b3-4c80b8787af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11041", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksmh6j6cs2g", "content": "", "creation_timestamp": "2025-03-20T11:40:21.962854Z"}, {"uuid": "4f3b5222-383c-46b2-bfea-0b9acb9ed417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11044", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lglsnpo4qm2t", "content": "", "creation_timestamp": "2025-01-25T21:01:58.859809Z"}, {"uuid": "7bd40bda-b40c-4253-a999-a63924fd262c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11042", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksmh7do2f2u", "content": "", "creation_timestamp": "2025-03-20T11:40:22.911045Z"}, {"uuid": "046c00a5-2d3c-4d0c-bff3-6a1d7e6db277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11045", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksmha7tck2v", "content": "", "creation_timestamp": "2025-03-20T11:40:23.983708Z"}, {"uuid": "51ba6d3c-cd28-4281-b50f-99ea1f10cec2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11040", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxzjmxm2t", "content": "", "creation_timestamp": "2025-04-15T21:02:24.903823Z"}, {"uuid": "93916888-3707-4da6-adf1-5b91cd3b6955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11042", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxzm5tp2e", "content": "", "creation_timestamp": "2025-04-15T21:02:25.425289Z"}, {"uuid": "8770f6c2-3322-44a4-9dcb-58557fa3c4d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11040", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "687689c5-563d-4f6a-8900-d50477a2ba17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1104", "type": "seen", "source": "https://t.me/ctinow/190712", "content": "https://ift.tt/ZKHRiIB\nCVE-2024-1104", "creation_timestamp": "2024-02-22T13:26:58.000000Z"}, {"uuid": "fb2a49fa-076f-4b7f-959d-d8286958a32a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11049", "type": "seen", "source": "https://t.me/cvedetector/10415", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11049 - ZKTeco ZKBio Time Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11049 \nPublished : Nov. 10, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in ZKTeco ZKBio Time 9.0.1. Affected is an unknown function of the file /auth_files/photo/ of the component Image File Handler. The manipulation leads to direct request. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T08:19:20.000000Z"}, {"uuid": "a59d938a-6a44-4c1f-b3b4-4e9652c075a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11047", "type": "seen", "source": "https://t.me/cvedetector/10414", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11047 - D-Link DI-8003 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11047 \nPublished : Nov. 10, 2024, 4:15 a.m. | 29\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been declared as critical. Affected by this vulnerability is the function upgrade_filter_asp of the file /upgrade_filter.asp. The manipulation of the argument path leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T05:48:53.000000Z"}, {"uuid": "51208af3-89d5-45d8-8d7a-ad26f96969a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11048", "type": "seen", "source": "https://t.me/cvedetector/10413", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11048 - \"D-Link DI-8003 ASP Stack Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-11048 \nPublished : Nov. 10, 2024, 4:15 a.m. | 29\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been rated as critical. Affected by this issue is the function dbsrv_asp of the file /dbsrv.asp. The manipulation of the argument str leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T05:48:53.000000Z"}, {"uuid": "b4fca036-7740-4feb-b619-5bdd12c10434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11046", "type": "seen", "source": "https://t.me/cvedetector/10412", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11046 - D-Link DI-8003 OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11046 \nPublished : Nov. 10, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been classified as critical. Affected is the function upgrade_filter_asp of the file /upgrade_filter.asp. The manipulation of the argument path leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T04:58:42.000000Z"}, {"uuid": "493b8bdc-f1e0-4112-a7d2-a82068322be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1104", "type": "seen", "source": "https://t.me/ctinow/206645", "content": "https://ift.tt/Yw7FlIc\nCVE-2024-1104 | Areal Topkapi Webserv2 6.2.4776 excessive authentication", "creation_timestamp": "2024-03-13T13:07:10.000000Z"}, {"uuid": "06107402-5d94-417c-a491-4f3d0cc8e141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1104", "type": "seen", "source": "https://t.me/ctinow/190709", "content": "https://ift.tt/ZKHRiIB\nCVE-2024-1104", "creation_timestamp": "2024-02-22T13:26:56.000000Z"}]}