{"vulnerability": "CVE-2024-22532", "sightings": [{"uuid": "4b931da5-61fb-41c9-b049-d9b6f6b004d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "seen", "source": "https://t.me/arpsyndicate/3406", "content": "#ExploitObserverAlert\n\nZDI-24-100\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-100. Allegra serveMathJaxLibraries Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Allegra. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-22532.", "creation_timestamp": "2024-02-11T14:28:19.000000Z"}, {"uuid": "1b89f534-3424-4226-9cbf-0bb4b531161f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "seen", "source": "https://t.me/ctinow/198670", "content": "https://ift.tt/teDvZHU\nCVE-2024-22532 | Steinbeis Allegra serveMathJaxLibraries path traversal", "creation_timestamp": "2024-03-03T10:46:27.000000Z"}, {"uuid": "899b2110-e85a-43fb-884e-a28815efc0ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "seen", "source": "https://t.me/ctinow/196026", "content": "https://ift.tt/RzF8YIG\nCVE-2024-22532", "creation_timestamp": "2024-02-29T00:26:55.000000Z"}, {"uuid": "c249ea50-a5aa-4631-8754-81431860fcff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "seen", "source": "https://t.me/ctinow/196033", "content": "https://ift.tt/RzF8YIG\nCVE-2024-22532", "creation_timestamp": "2024-02-29T00:27:04.000000Z"}, {"uuid": "de964f8c-60e2-45a1-91b9-fc9ffb936f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2015", "content": "https://github.com/pwndorei/CVE-2024-22532\n\nDenial of Service\n#github #DOS #poc", "creation_timestamp": "2024-02-23T06:16:31.000000Z"}, {"uuid": "f6e96b74-3c95-40db-b54f-1c00e7a4aa8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22532", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10025", "content": "#exploit\n1. XAMPP Buffer Overflow (Unicode+SEH)\nhttps://www.exploit-db.com/exploits/51800\n\n2. CVE-2024-22532:\nXnSoft XnView 2.51.5 and NConvert 7.163 - Heap-based Buffer Overflow\nhttps://github.com/pwndorei/CVE-2024-22532\n\n3. CVE-2024-22319:\nIBM ODM RCE\nhttps://labs.watchtowr.com/double-k-o-rce-in-ibm-operation-decision-manager", "creation_timestamp": "2024-02-23T12:23:01.000000Z"}]}