{"vulnerability": "CVE-2024-2116", "sightings": [{"uuid": "5a6b94e4-d3c6-4a33-9036-486da0222f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21164", "type": "seen", "source": "https://gist.github.com/farazsth98/eae315ba6f419f360ab6de04661baa51", "content": "", "creation_timestamp": "2025-10-07T12:28:32.000000Z"}, {"uuid": "c6dfe221-c96e-4913-b3d2-d14b349f838b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21164", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8919", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a CVE-2024-21164\nURL\uff1ahttps://github.com/Jaden1419/-CVE-2024-21164\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-01T16:08:16.000000Z"}, {"uuid": "a2e50984-6445-402f-8b90-3088f672447c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21163", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7826", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21163\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\ud83d\udccf Published: 2024-07-16T22:40:04.314Z\n\ud83d\udccf Modified: 2025-03-17T18:37:17.416Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujul2024.html", "creation_timestamp": "2025-03-17T19:34:18.000000Z"}, {"uuid": "c3d78c17-9a07-4177-90aa-15be50fad1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21164", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7954", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21164\n\ud83d\udd25 CVSS Score: 2.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 7.0.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).\n\ud83d\udccf Published: 2024-07-16T22:40:04.641Z\n\ud83d\udccf Modified: 2025-03-18T18:40:14.532Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujul2024.html", "creation_timestamp": "2025-03-18T19:02:46.000000Z"}]}