{"vulnerability": "CVE-2024-2236", "sightings": [{"uuid": "d4518225-118b-4471-9dc2-17f1a91b3d58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2236", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lw7rjefydk2i", "content": "", "creation_timestamp": "2025-08-12T16:52:50.025518Z"}, {"uuid": "03d2edf2-5548-4d28-922d-f66c33a53e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22365", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lzemcfl4s22b", "content": "", "creation_timestamp": "2025-09-21T19:18:22.966394Z"}, {"uuid": "14229d07-2053-4336-9561-6124ad93eebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2236", "type": "seen", "source": "https://gist.github.com/gszr/a40573432a259a7a925124168844a175", "content": "", "creation_timestamp": "2025-11-18T19:05:17.000000Z"}, {"uuid": "a81a8f34-631b-429a-9682-b034ca6679ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22363", "type": "seen", "source": "https://gist.github.com/EduardoCorpay/fdaeb4ec65cc4a1c8fcd2fb0162de09c", "content": "", "creation_timestamp": "2025-06-11T15:29:00.000000Z"}, {"uuid": "7c11d784-ebb6-4b28-9772-37103c0789bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/7Ml4_lMheQFWoLP8HS6G4y2kPw4O-CbsZ96PEHQtUpuC3WA", "content": "", "creation_timestamp": "2025-05-04T05:10:20.000000Z"}, {"uuid": "c5a13bd3-fc45-4880-a133-e0217c4991dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-2236", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "7ab4b625-ba25-460f-90b0-c4667450e273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6645", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-22369 Reproducer\nURL\uff1ahttps://github.com/oscerd/CVE-2024-22369\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-02-20T17:51:08.000000Z"}, {"uuid": "a2e09e3c-e96d-4ec0-ba89-099bbad0674c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/P054ImMwjqD_rl7lBAm-hCz5MlTq06QbnDeiIVFMTFFsHy4", "content": "", "creation_timestamp": "2025-05-04T05:11:16.000000Z"}, {"uuid": "69930ed8-ddf9-4252-974c-39c9ce76e189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22360", "type": "seen", "source": "Telegram/aZnqd84Govqe71A_bRZsQ2bt7s41B2w-crbNIzBIZHhsCzlz", "content": "", "creation_timestamp": "2025-02-01T17:28:11.000000Z"}, {"uuid": "d08e68cb-e22a-4178-aadb-91786360a919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22360", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22360\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted query on certain columnar tables.  IBM X-Force ID:  280905.\n\ud83d\udccf Published: 2024-04-03T12:32:21.341Z\n\ud83d\udccf Modified: 2025-02-27T20:10:04.609Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7145730\n2. https://https://exchange.xforce.ibmcloud.com/vulnerabilities/280905\n3. https://security.netapp.com/advisory/ntap-20240517-0003/", "creation_timestamp": "2025-02-27T20:25:40.000000Z"}, {"uuid": "0a40642a-6491-4acb-a20a-781b6e02f4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/1o3RyjbxkBAdqVV1IakPcUVDj3AIfLmG662gmZzR_AzpiWSm", "content": "", "creation_timestamp": "2025-01-20T11:03:21.000000Z"}, {"uuid": "6a0d5e31-fee0-41d1-b0c9-b26f3123508e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/sSOYy9sa0Jc9yTev23pVTCXx5ZwCCV54W3-F49CmFMjcWAGd", "content": "", "creation_timestamp": "2025-01-19T10:45:19.000000Z"}, {"uuid": "98bb486f-a146-4a48-adc1-545e206b0336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/UrNq84zyBC1oMAufBesPTpXAbedIsqXaSNJFq3mfmDUScAM", "content": "", "creation_timestamp": "2024-10-04T00:51:11.000000Z"}, {"uuid": "97311b0a-560e-4fff-9ea8-ab42554d3c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/m_uXFR_n3tw3cdqXp4eNTFp75GNkXoZP5JCdghj_BLdvWjAh", "content": "", "creation_timestamp": "2025-01-19T10:54:11.000000Z"}, {"uuid": "c5f72e66-8a9b-44bf-9de4-23f035e1e3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/CRo72oop6ZwQnESqwzNS9o-UvXAtRRZBbTaMpkpQIbIEQGCv", "content": "", "creation_timestamp": "2025-01-19T09:05:11.000000Z"}, {"uuid": "58da9948-294a-44ca-9de6-3e870616c4ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/V1VUnV7rs7gBAtSdtSG9YU8DOLHIzu1kUZjtLh94w5_yW5C9", "content": "", "creation_timestamp": "2024-12-22T22:15:30.000000Z"}, {"uuid": "7cb78d9b-e7d5-4d46-9340-d2948268b1d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22366", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19055", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22366\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.\n\ud83d\udccf Published: 2024-01-24T04:35:55.337Z\n\ud83d\udccf Modified: 2025-06-20T19:27:11.652Z\n\ud83d\udd17 References:\n1. http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html\n2. https://jvn.jp/en/vu/JVNVU99896362/", "creation_timestamp": "2025-06-20T19:43:42.000000Z"}, {"uuid": "67144805-c05d-4c28-a92a-b3a84b53a5a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/56148", "content": "#exploit\nCVE-2024-20328:\nClamAV Command Injection Bug\nhttps://amitschendel.github.io/vulnerabilites/CVE-2024-20328\n\nCVE-2024-24816:\nCKEditor XSS vulnerability\nhttps://github.com/afine-com/CVE-2024-24816\n\nCVE-2023-35080:\nIvanti/Pulse VPN Client Exploit\nhttps://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation\n\nCVE-2024-0811:\nChrome pageCapture.saveAsMHTML() Extension API Blocked Origin Bypass\nhttps://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html\n\nCVE-2023-50387:\nKeyTrap in DNS/DNSSEC\nhttps://github.com/knqyf263/CVE-2023-50387\n\nCVE-2024-22369:\nApache Camel Unsafe Deserialization\nhttps://github.com/oscerd/CVE-2024-22369\n\nCVE-2024-1708/CVE-2024-1709:\nScreenConnect Authentication Bypass\nhttps://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass\n\nCCE-2024-21413:\nMicrosoft Outlook RCE\nhttps://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability\n\nCVE-2024-24401:\nNagios Authenticated SQL Injection\nhttps://github.com/MAWK0235/CVE-2024-24401\n\nCVE-2024-1071:\nWordPress Ultimate Member Unauthorized Database Access/SQLi\nhttps://github.com/gbrsh/CVE-2024-1071\n\nCVE-2024-1651:\nTorrentpier RCE Exploit\nhttps://github.com/sharpicx/CVE-2024-1651-PoC\n\nCVE-2023-50386:\nApache Solr Backup/Restore APIs RCE\nhttps://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC\n\nCVE-2024-21762:\nFortiOS 6.0 - 7.4 - OoB/RCE\nhttps://github.com/c0d3b3af/CVE-2024-21762-POC\n\nCVE-2024-26521:\nCE Phoenix v1.0.x Html Injection\nhttps://github.com/hackervegas001/CVE-2024-26521\n\nCVE-2024-21672:\nConfluence Data Center/ Server RCE\nhttps://github.com/swagcrafted/CVE-2024-21672-POC\n\nCVE-2023-49109:\nRCE in Apache Dolphinscheduler\nhttps://xz.aliyun.com/t/13913?time__1311=mqmxnQ0%3D3eqQqGNDQiFbFD9Q7fCKAKx\n\nCVE-2024-21410:\nMS Exchange Privilege Escalation\nhttps://github.com/FreakyM0ndy/CVE-2024-21410-poc", "creation_timestamp": "2024-10-04T00:51:54.000000Z"}, {"uuid": "d8c9310f-ef8f-45b5-b949-24452d4c29e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/119126", "content": "#exploit\nCVE-2024-20328:\nClamAV Command Injection Bug\nhttps://amitschendel.github.io/vulnerabilites/CVE-2024-20328\n\nCVE-2024-24816:\nCKEditor XSS vulnerability\nhttps://github.com/afine-com/CVE-2024-24816\n\nCVE-2023-35080:\nIvanti/Pulse VPN Client Exploit\nhttps://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation\n\nCVE-2024-0811:\nChrome pageCapture.saveAsMHTML() Extension API Blocked Origin Bypass\nhttps://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html\n\nCVE-2023-50387:\nKeyTrap in DNS/DNSSEC\nhttps://github.com/knqyf263/CVE-2023-50387\n\nCVE-2024-22369:\nApache Camel Unsafe Deserialization\nhttps://github.com/oscerd/CVE-2024-22369\n\nCVE-2024-1708/CVE-2024-1709:\nScreenConnect Authentication Bypass\nhttps://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass\n\nCCE-2024-21413:\nMicrosoft Outlook RCE\nhttps://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability\n\nCVE-2024-24401:\nNagios Authenticated SQL Injection\nhttps://github.com/MAWK0235/CVE-2024-24401\n\nCVE-2024-1071:\nWordPress Ultimate Member Unauthorized Database Access/SQLi\nhttps://github.com/gbrsh/CVE-2024-1071\n\nCVE-2024-1651:\nTorrentpier RCE Exploit\nhttps://github.com/sharpicx/CVE-2024-1651-PoC\n\nCVE-2023-50386:\nApache Solr Backup/Restore APIs RCE\nhttps://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC\n\nCVE-2024-21762:\nFortiOS 6.0 - 7.4 - OoB/RCE\nhttps://github.com/c0d3b3af/CVE-2024-21762-POC\n\nCVE-2024-26521:\nCE Phoenix v1.0.x Html Injection\nhttps://github.com/hackervegas001/CVE-2024-26521\n\nCVE-2024-21672:\nConfluence Data Center/ Server RCE\nhttps://github.com/swagcrafted/CVE-2024-21672-POC\n\nCVE-2023-49109:\nRCE in Apache Dolphinscheduler\nhttps://xz.aliyun.com/t/13913?time__1311=mqmxnQ0%3D3eqQqGNDQiFbFD9Q7fCKAKx\n\nCVE-2024-21410:\nMS Exchange Privilege Escalation\nhttps://github.com/FreakyM0ndy/CVE-2024-21410-poc", "creation_timestamp": "2024-10-04T00:51:53.000000Z"}, {"uuid": "391b38b1-5038-422c-8bfe-d0ba545c6b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22362", "type": "seen", "source": "https://t.me/arpsyndicate/2940", "content": "#ExploitObserverAlert\n\nCVE-2024-22362\n\nDESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-22362. Drupal contains a vulnerability with improper handling of structural elements. If this vulnerability is exploited, an attacker may be able to cause a denial-of-service (DoS) condition.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-01-19T17:03:45.000000Z"}, {"uuid": "93b95140-e908-4ad3-aa76-f7c53d10eab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/1yNdYtjM167PWJ8z4QCuhWfayRW6CDLYSnp7378ajV5EDt8", "content": "", "creation_timestamp": "2024-10-04T00:51:08.000000Z"}, {"uuid": "9efd8723-8992-48b3-9397-cee03ad8eb96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/PfifvZz7tMW-Pq-u9dIIWpX49EGHHaNBJSKvwqdUIESB65tP", "content": "", "creation_timestamp": "2025-01-19T10:54:13.000000Z"}, {"uuid": "80135637-e700-4bf0-b76b-ee8a19b80da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "seen", "source": "https://t.me/arpsyndicate/3835", "content": "#ExploitObserverAlert\n\nCVE-2024-22369\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22369. Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.  Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1", "creation_timestamp": "2024-02-21T15:14:11.000000Z"}, {"uuid": "c935e11a-fb04-4cec-988d-4e3217302a9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/OIy-vi5ELr4cctl8ownkSK8SkQmdcofc4nGKbyP-zK6wBJzg", "content": "", "creation_timestamp": "2025-01-19T10:45:24.000000Z"}, {"uuid": "5c354aa7-a5ac-41af-b71b-be9239412cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22362", "type": "seen", "source": "https://t.me/ctinow/178589", "content": "https://ift.tt/ZJATC01\nCVE-2024-22362 | Drupal prior 9.5.0 Structural Element denial of service", "creation_timestamp": "2024-02-03T15:46:47.000000Z"}, {"uuid": "7250c725-9199-49fa-adbb-7adf83bd2169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/MI65lLGsaGTIv40PK1J154YyMiL63QZNJWuw9XlT_YRsFb40", "content": "", "creation_timestamp": "2025-01-19T09:05:12.000000Z"}, {"uuid": "db454d48-608d-4d32-92ca-6412d9d3fa45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/1Z5p7xYqKVRAHiS5stM6LcQjCrKKZtV6q5K3lriQD01vETjY", "content": "", "creation_timestamp": "2025-01-20T11:03:16.000000Z"}, {"uuid": "87927846-2777-4db8-ae73-7322aee039d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "Telegram/7b0KDMH2WfquipCst9Tv71iesbtnEU4bQJg16OEgDf9nbvsj", "content": "", "creation_timestamp": "2024-12-22T22:15:27.000000Z"}, {"uuid": "c530a5c3-97bc-4be2-b005-a224ebad1306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22361", "type": "seen", "source": "https://t.me/ctinow/198713", "content": "https://ift.tt/EW64kho\nCVE-2024-22361 | IBM Semeru Runtime up to 8.0.392.0/11.0.21.0/17.0.9.0/21.0.1.0 risky encryption (XFDB-281222)", "creation_timestamp": "2024-03-03T13:11:33.000000Z"}, {"uuid": "751f5a26-3b05-40aa-848c-a8ce1093073b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "seen", "source": "https://t.me/ctinow/188218", "content": "https://ift.tt/sEQSVJc\nCVE-2024-22369 | Apache Camel up to 3.21.3/3.22.0/4.0.3 Camel-SQL deserialization", "creation_timestamp": "2024-02-20T08:42:04.000000Z"}, {"uuid": "5434985a-7ac9-44e5-b788-5fb0eebd4032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22365", "type": "seen", "source": "https://t.me/ctinow/184446", "content": "https://ift.tt/Xopxvba\nCVE-2024-22365 Exploit", "creation_timestamp": "2024-02-14T08:16:52.000000Z"}, {"uuid": "b16a315e-7b8e-4278-ac6c-2ec35f1e8729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22361", "type": "seen", "source": "https://t.me/ctinow/182604", "content": "https://ift.tt/5glThKD\nCVE-2024-22361", "creation_timestamp": "2024-02-10T16:21:46.000000Z"}, {"uuid": "dee866cc-5e78-4d41-a5d3-66febd6fd6bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2236", "type": "seen", "source": "https://t.me/ctinow/201890", "content": "https://ift.tt/z0BaULD\nCVE-2024-2236", "creation_timestamp": "2024-03-06T23:32:25.000000Z"}, {"uuid": "cbccdd32-ee42-4a48-9503-5fdcf824f927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2236", "type": "seen", "source": "https://t.me/ctinow/201858", "content": "https://ift.tt/tes9wI8\nCVE-2024-2236", "creation_timestamp": "2024-03-06T22:31:12.000000Z"}, {"uuid": "2c4bd354-2389-4bba-a0b8-2abe60ffb2d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "seen", "source": "https://t.me/ctinow/188677", "content": "https://ift.tt/LzBSMAq\nCVE-2024-22369", "creation_timestamp": "2024-02-20T16:37:08.000000Z"}, {"uuid": "3b4bb67f-e41d-4cc1-93a4-1058a1ba29a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "seen", "source": "https://t.me/ctinow/188144", "content": "https://ift.tt/gJabLrS\nCVE-2024-22369", "creation_timestamp": "2024-02-20T06:31:43.000000Z"}, {"uuid": "a6288567-c9d0-44e3-ae61-e7f55eafe3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22366", "type": "seen", "source": "https://t.me/ctinow/186963", "content": "https://ift.tt/qjPilXJ\nCVE-2024-22366 | Yamaha WLX222/WLX413/WLX212/WLX313/WLX202 debug code", "creation_timestamp": "2024-02-17T16:21:32.000000Z"}, {"uuid": "9e7f8c38-299d-445e-a766-a5e0bd0a1dcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22365", "type": "seen", "source": "https://t.me/ctinow/179851", "content": "https://ift.tt/J6i9cZ1\nCVE-2024-22365", "creation_timestamp": "2024-02-06T09:26:16.000000Z"}, {"uuid": "1571515d-111e-4fc3-9e17-98e5b4bf41e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22365", "type": "seen", "source": "https://t.me/ctinow/183016", "content": "https://ift.tt/lOwF4iX\nCVE-2024-22365 | Linux-PAM up to 1.5.3 pam_namespace.so protect_dir denial of service", "creation_timestamp": "2024-02-12T10:41:45.000000Z"}, {"uuid": "34bc52ba-be85-49ae-bdd8-e1d5039b7617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22368", "type": "seen", "source": "https://t.me/ctinow/164915", "content": "https://ift.tt/ufreBQg\nCVE-2024-22368", "creation_timestamp": "2024-01-09T10:26:25.000000Z"}, {"uuid": "ee47d3ea-1170-4e7a-b4d4-8f2f5a329fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22368", "type": "seen", "source": "https://t.me/ctinow/174047", "content": "https://ift.tt/BCxsGrd\nCVE-2024-22368 | Spreadsheet::ParseXLSX prior 0.28 on Perl XLSX Document resource consumption", "creation_timestamp": "2024-01-26T08:36:16.000000Z"}, {"uuid": "e944e7e6-0e13-4ee7-bd52-6f0b0ca8b81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22362", "type": "seen", "source": "https://t.me/ctinow/168622", "content": "https://ift.tt/d6cGw1S\nCVE-2024-22362", "creation_timestamp": "2024-01-16T05:26:34.000000Z"}, {"uuid": "9ef915a7-0b94-4e9a-b990-9780d4c2958a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22365", "type": "seen", "source": "https://t.me/ctinow/170187", "content": "https://ift.tt/UylImN8\nCVE-2024-22365", "creation_timestamp": "2024-01-19T13:31:37.000000Z"}, {"uuid": "8f3e7c92-061f-42c3-b9da-25094a8cc338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22369", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10008", "content": "#exploit\n1. CVE-2024-0811:\nChrome pageCapture.saveAsMHTML() Extension API Blocked Origin Bypass\nhttps://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html\n\n2. CVE-2023-50387:\nKeyTrap in DNS/DNSSEC\nhttps://github.com/knqyf263/CVE-2023-50387\n\n3. CVE-2024-22369:\nApache Camel Unsafe Deserialization\nhttps://github.com/oscerd/CVE-2024-22369", "creation_timestamp": "2024-02-20T14:41:20.000000Z"}, {"uuid": "0672e337-64f5-4ac6-886d-8ff4eeb3c9ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22366", "type": "seen", "source": "https://t.me/ctinow/172537", "content": "https://ift.tt/FX72Lqg\nCVE-2024-22366", "creation_timestamp": "2024-01-24T06:26:36.000000Z"}]}