{"vulnerability": "CVE-2024-2239", "sightings": [{"uuid": "9664e8bd-7769-4ae8-9a76-01affce4ce9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7281", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit CVE-2024-22393\nURL\uff1ahttps://github.com/omranisecurity/CVE-2024-22393\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-12T07:43:02.000000Z"}, {"uuid": "e097ffb6-4303-4fd4-90a8-8aa499e054cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22397\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code.\n\ud83d\udccf Published: 2024-03-14T03:23:52.971Z\n\ud83d\udccf Modified: 2025-03-27T17:01:13.903Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0005", "creation_timestamp": "2025-03-27T17:26:45.000000Z"}, {"uuid": "425662cc-8eb8-40b8-a9f5-2f5d5a73c343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22393\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nPixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user\u00a0can cause such an attack by uploading an image when posting content.\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.\n\ud83d\udccf Published: 2024-02-22T09:51:43.432Z\n\ud83d\udccf Modified: 2025-04-22T16:20:44.318Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv\n2. http://www.openwall.com/lists/oss-security/2024/02/22/1", "creation_timestamp": "2025-04-22T17:03:35.000000Z"}, {"uuid": "bbcc4906-c490-43ff-a18c-ca68c5debe03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22399", "type": "seen", "source": "https://t.me/cvedetector/5719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22399 - Apache Seata Deserialization of Untrusted Data RCE\", \n  \"Content\": \"CVE ID : CVE-2024-22399 \nPublished : Sept. 16, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Apache Seata.\u00a0  \n  \nWhen developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.  \n  \nThis issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.  \n  \nUsers are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T15:21:30.000000Z"}, {"uuid": "3a24073f-3c13-4a9e-ae6b-4d7dbe885213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207471", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:27:00.000000Z"}, {"uuid": "77a87796-c393-493d-b87a-a85fda243aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207462", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:21:46.000000Z"}, {"uuid": "b2435803-ea5a-4f4d-8e00-31213ef798cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207461", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:21:45.000000Z"}, {"uuid": "309bc04e-9e68-4411-a2d6-1f52b529f9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22394", "type": "seen", "source": "https://t.me/ctinow/181279", "content": "https://ift.tt/CA5gxwX\nCVE-2024-22394 | SonicWall SonicOS 7.1.1-7040 SSL-VPN improper authentication (SNWLID-2024-0003)", "creation_timestamp": "2024-02-08T11:07:08.000000Z"}, {"uuid": "53e45d8c-91a8-4d7e-876d-c90f76971c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22395", "type": "seen", "source": "https://t.me/ctinow/207020", "content": "https://ift.tt/19xY7Gj\nCVE-2024-22395 | SonicWALL SMA 100/SMA 200/SMA 210/SMA 400/SMA 410/SMA 500v up to 10.2.1.10-62sv MFA access control (SNWLID-2024-0001)", "creation_timestamp": "2024-03-13T18:41:57.000000Z"}, {"uuid": "d6dd2fb4-f10f-4ac2-a6d3-cf897f629611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207470", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:26:56.000000Z"}, {"uuid": "76fdd6ae-2d91-433e-8bf6-f318d79a20ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207469", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:26:55.000000Z"}, {"uuid": "d77220ff-2e68-4efd-9bae-84b99df70b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207463", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:21:47.000000Z"}, {"uuid": "4c4d9033-8af4-49c9-91d7-16d703e60759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22395", "type": "seen", "source": "https://t.me/ctinow/192368", "content": "https://ift.tt/UYDWoCn\nCVE-2024-22395", "creation_timestamp": "2024-02-24T01:26:30.000000Z"}, {"uuid": "3dc258ee-a4c0-4434-9baf-e3847a6638a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22395", "type": "seen", "source": "https://t.me/ctinow/192367", "content": "https://ift.tt/UYDWoCn\nCVE-2024-22395", "creation_timestamp": "2024-02-24T01:26:29.000000Z"}, {"uuid": "e6014bc0-aa2d-4e55-a350-9e6ab678d6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "seen", "source": "https://t.me/ctinow/190632", "content": "https://ift.tt/C3MJ1dg\nCVE-2024-22393", "creation_timestamp": "2024-02-22T11:26:50.000000Z"}, {"uuid": "9fdc7a70-63d1-4028-a22d-3ba9babb4dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22394", "type": "seen", "source": "https://t.me/ctinow/181133", "content": "https://ift.tt/VqsWjYf\nCVE-2024-22394", "creation_timestamp": "2024-02-08T03:31:42.000000Z"}, {"uuid": "b4dff99c-f1b4-4da7-a165-cbc5eedb6158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "seen", "source": "https://t.me/ctinow/190638", "content": "https://ift.tt/C3MJ1dg\nCVE-2024-22393", "creation_timestamp": "2024-02-22T11:26:58.000000Z"}]}