{"vulnerability": "CVE-2024-2177", "sightings": [{"uuid": "b8fc1313-34cc-47e2-9fce-8a5942d8b59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21771", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8508", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21771\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: \nFor unspecified traffic patterns, BIG-IP AFM IPS engine may spend an excessive amount of time matching the traffic against signatures, resulting in Traffic Management Microkernel (TMM) restarting and traffic disruption.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\ud83d\udccf Published: 2024-02-14T16:30:21.300Z\n\ud83d\udccf Modified: 2025-03-24T19:08:35.051Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K000137595", "creation_timestamp": "2025-03-24T19:23:17.000000Z"}, {"uuid": "a5bbf88d-5114-4a19-b65d-3ad834a6be16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21778", "type": "seen", "source": "https://t.me/cvedetector/194", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21778 - A heap-based buffer overflow vulnerability exists\", \n  \"Content\": \"CVE ID : CVE-2024-21778 \nPublished : July 8, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : A heap-based buffer overflow vulnerability exists in the configuration file mib_init_value_array functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted .dat file can lead to arbitrary code execution. An attacker can upload a malicious file to trigger this vulnerability. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T18:40:40.000000Z"}, {"uuid": "114c9870-1eaf-4a26-b4db-994f35df56a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2177", "type": "seen", "source": "https://t.me/cvedetector/352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2177 - A Cross Window Forgery vulnerability exists within\", \n  \"Content\": \"CVE ID : CVE-2024-2177 \nPublished : July 9, 2024, 2:15 p.m. | 26\u00a0minutes ago \nDescription : A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T16:52:10.000000Z"}, {"uuid": "d594ed35-066f-41a9-b36d-2884181003e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21775", "type": "seen", "source": "https://t.me/ctinow/203157", "content": "https://ift.tt/RfukaCE\nCVE-2024-21775 | Zoho ManageEngine Exchange Reporter Plus up to 5714 Report Exporting sql injection", "creation_timestamp": "2024-03-08T08:56:42.000000Z"}, {"uuid": "214705ec-d484-4327-95e3-cb6e8b5ca960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21775", "type": "seen", "source": "https://t.me/ctinow/186493", "content": "https://ift.tt/d6iMphP\nCVE-2024-21775", "creation_timestamp": "2024-02-16T16:21:44.000000Z"}, {"uuid": "e661ff23-2ee5-4dc5-98a3-e40e5eb028bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21773", "type": "seen", "source": "https://t.me/ctinow/175751", "content": "https://ift.tt/DN2WOgB\nCVE-2024-21773 | TP-Link Archer AX3000/Archer AX5400/Deco X50/Deco XE200 os command injection", "creation_timestamp": "2024-01-30T08:41:35.000000Z"}, {"uuid": "9dec9609-fdfb-4481-bff8-f76074dc0faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21773", "type": "seen", "source": "https://t.me/ctinow/166264", "content": "https://ift.tt/1IzkKHU\nCVE-2024-21773", "creation_timestamp": "2024-01-11T01:31:53.000000Z"}]}