{"vulnerability": "CVE-2024-2069", "sightings": [{"uuid": "4ed243cc-5813-43c3-a959-c6560066a791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1696/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "abdc5233-a8ec-4125-9b72-a58b80444efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}, {"uuid": "d99a8931-82a2-4e31-b065-c487850d3a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20696\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows libarchive Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:56:52.848Z\n\ud83d\udccf Modified: 2025-04-17T17:51:31.051Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696", "creation_timestamp": "2025-04-17T17:57:22.000000Z"}, {"uuid": "a41ac1d1-ec8a-4168-af3f-d8867121585f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14672", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20692\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:07.695Z\n\ud83d\udccf Modified: 2025-05-03T01:46:49.131Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692", "creation_timestamp": "2025-05-03T02:16:42.000000Z"}, {"uuid": "10d18e19-15cc-4001-be8d-b691b742b16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "seen", "source": "https://t.me/arpsyndicate/4475", "content": "#ExploitObserverAlert\n\nCVE-2024-20693\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-20693. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-04-11T08:05:47.000000Z"}, {"uuid": "86624cdc-37d4-4c35-ba23-986595844475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "Telegram/lR5J4hOt5BrRokgK2u5rcj7gPJxxEngjC1J-5N9HnnVyMQ", "content": "", "creation_timestamp": "2024-01-26T02:00:00.000000Z"}, {"uuid": "2b7499f6-5b5b-42b0-8982-ca4073557583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/3623", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-20T13:07:57.000000Z"}, {"uuid": "f04d8298-f1b7-4b36-89d2-8aaf6f9b7e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "seen", "source": "https://t.me/arpsyndicate/3123", "content": "#ExploitObserverAlert\n\nCVE-2024-20698\n\nDESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2024-20698. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.001460000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-27T23:58:47.000000Z"}, {"uuid": "822d2003-9d80-499b-86a3-38a4b11c0934", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20694", "type": "seen", "source": "https://t.me/ctinow/165326", "content": "https://ift.tt/rDhZ3Ep\nCVE-2024-20694 | Microsoft Windows up to Server 2022 23H2 CoreMessaging information disclosure", "creation_timestamp": "2024-01-09T20:16:31.000000Z"}, {"uuid": "86987a8a-97b8-42e8-9ced-689bf5493be8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2069", "type": "seen", "source": "https://t.me/ctinow/197818", "content": "https://ift.tt/i4KnDdX\nCVE-2024-2069", "creation_timestamp": "2024-03-01T17:26:30.000000Z"}, {"uuid": "7c8ac6dd-c5b3-4076-bff1-216efa89154e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20695", "type": "seen", "source": "https://t.me/ctinow/184100", "content": "https://ift.tt/3qZRaeS\nCVE-2024-20695 | Microsoft Skype for Business Server 2019 CU7 information disclosure", "creation_timestamp": "2024-02-13T20:06:34.000000Z"}, {"uuid": "cb52c785-cddb-47c3-86fb-52dc34bea2d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20691", "type": "seen", "source": "https://t.me/ctinow/165324", "content": "https://ift.tt/YaBMgl9\nCVE-2024-20691 | Microsoft Windows up to Server 2022 23H2 Themes information disclosure", "creation_timestamp": "2024-01-09T20:16:28.000000Z"}, {"uuid": "9a7c5848-0407-4b1d-8ce5-d8604d3549a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20692", "type": "seen", "source": "https://t.me/ctinow/165325", "content": "https://ift.tt/6Ng8Ry3\nCVE-2024-20692 | Microsoft Windows up to Server 2022 23H2 Local Security Authority Subsystem Service information disclosure", "creation_timestamp": "2024-01-09T20:16:30.000000Z"}, {"uuid": "a83f7599-9642-4875-a19f-86f6d148c5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "seen", "source": "https://t.me/ctinow/165329", "content": "https://ift.tt/LQb6nzl\nCVE-2024-20698 | Microsoft Windows up to Server 2022 23H2 Kernel Local Privilege Escalation", "creation_timestamp": "2024-01-09T20:16:35.000000Z"}, {"uuid": "0c7eabad-7e22-4173-9411-51a38b0e8573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "seen", "source": "https://t.me/ctinow/165328", "content": "https://ift.tt/hgLt5uC\nCVE-2024-20697 | Microsoft Windows 11 22H2/11 23H2/Server 2022 23H2 Libarchive Remote Code Execution", "creation_timestamp": "2024-01-09T20:16:34.000000Z"}, {"uuid": "c62bf25e-efeb-408d-8561-5672fc78e7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20699", "type": "seen", "source": "https://t.me/ctinow/165330", "content": "https://ift.tt/MEPQDL5\nCVE-2024-20699 | Microsoft Windows up to Server 2022 23H2 Hyper-V denial of service", "creation_timestamp": "2024-01-09T20:16:37.000000Z"}, {"uuid": "82931015-fcf6-45c9-8f82-e40279d9cb53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "https://t.me/ctinow/165327", "content": "https://ift.tt/uZhmJyR\nCVE-2024-20696 | Microsoft Windows up to Server 2022 23H2 Libarchive Remote Code Execution", "creation_timestamp": "2024-01-09T20:16:32.000000Z"}, {"uuid": "7b5dbf53-b71d-46f6-ba69-ebbd03af21ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20690", "type": "seen", "source": "https://t.me/ctinow/165323", "content": "https://ift.tt/yqKUpvA\nCVE-2024-20690 | Microsoft Windows up to 11 23H2 Nearby Sharing unknown vulnerability", "creation_timestamp": "2024-01-09T20:16:27.000000Z"}, {"uuid": "6f071bf2-9c7c-4997-88b6-983fbf55438f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10690", "content": "#exploit\n1. CVE-2024-20693:\nWindows cached code signature manipulation\nhttps://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation\n\n2. CVE-2024-27804:\nApple iOS/iPadOS Kernel Memory Corruption\nhttps://github.com/R00tkitSMM/CVE-2024-27804", "creation_timestamp": "2024-06-17T18:10:14.000000Z"}, {"uuid": "705f3fb7-95e8-46c6-9dbb-aa06ec70c5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1899", "content": "https://github.com/RomanRybachek/CVE-2024-20698\n#github", "creation_timestamp": "2024-01-25T09:06:57.000000Z"}, {"uuid": "9c9752ae-1ff5-4205-8f7a-10c8a636ecad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2343", "content": "https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability\n\nCVE-2024-20697: WINDOWS LIBARCHIVE REMOTE CODE EXECUTION VULNERABILITY\n#\u5206\u6790", "creation_timestamp": "2024-04-18T17:15:40.000000Z"}, {"uuid": "287fb32f-07cc-41e9-b2ac-30ed44a08f80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9846", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024 -20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-01-25T12:47:06.000000Z"}, {"uuid": "c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10357", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-19T16:41:11.000000Z"}, {"uuid": "196c0ab1-a7d1-4731-968c-b40ce6bacb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}]}