{"vulnerability": "CVE-2024-1724", "sightings": [{"uuid": "97d28807-5b99-42b2-9bf5-6ea12e34555e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1724", "type": "seen", "source": "https://t.me/cvedetector/1642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-1724 - Snapd AppArmor Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-1724 \nPublished : July 25, 2024, 7:15 p.m. | 38\u00a0minutes ago \nDescription : In snapd versions prior to 2.62, when using AppArmor for enforcement of   \nsandbox permissions, snapd failed to restrict writes to the $HOME/bin  \npath. In Ubuntu, when this path exists, it is automatically added to  \nthe users PATH. An attacker who could convince a user to install a  \nmalicious snap which used the 'home' plug could use this vulnerability  \nto install arbitrary scripts into the users PATH which may then be run  \nby the user outside of the expected snap sandbox and hence allow them  \nto escape confinement. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T21:56:04.000000Z"}, {"uuid": "edda3755-4ae6-47ae-8511-138097f625d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1724", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/4455", "content": "\u200aCVE-2024-1724: Snap Sandbox Escape Vulnerability Threatens Linux Systems\n\nhttps://securityonline.info/cve-2024-1724-snap-sandbox-escape-vulnerability-threatens-linux-systems/", "creation_timestamp": "2024-07-02T11:12:42.000000Z"}, {"uuid": "9bf25ffa-be34-4a14-a72c-a0be3eb8e95a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1724", "type": "seen", "source": "https://t.me/CNArsenal/2750", "content": "https://gld.mcphail.uk/posts/explaining-cve-2024-1724/\n\nExplaining CVE-2024-1724\n#\u5206\u6790", "creation_timestamp": "2024-07-03T15:33:30.000000Z"}, {"uuid": "01054b5f-d30f-4055-86ec-c49942c87363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1724", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10778", "content": "#Threat_Research\n1. Attack of the clones: Getting RCE in Chrome\u2019s renderer with duplicate object properties\nhttps://github.blog/2024-06-26-attack-of-the-clones-getting-rce-in-chromes-renderer-with-duplicate-object-properties\n2. Explaining Linux Snap Sandbox Escape Vulnerability (CVE-2024-1724)\nhttps://gld.mcphail.uk/posts/explaining-cve-2024-1724", "creation_timestamp": "2024-07-03T23:20:14.000000Z"}]}