{"vulnerability": "CVE-2024-2292", "sightings": [{"uuid": "272600da-03a5-466e-b2a0-0c0307b12436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22923", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkc2pl6p6d2u", "content": "", "creation_timestamp": "2025-03-13T21:40:19.698897Z"}, {"uuid": "2ae9e069-115c-442d-b42f-5cadb9d329a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2292", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "8e3b65a2-9a3d-455f-b9c1-af1ec1569aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22927", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mk6vwtmun32i", "content": "", "creation_timestamp": "2026-04-23T21:03:10.794390Z"}, {"uuid": "fc77d172-afd7-4139-aa68-5c0b5b82dd2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22920", "type": "seen", "source": "https://t.me/ctinow/185495", "content": "https://ift.tt/ifMZlNu\nCVE-2024-22920 | SWFTools 0.9.2 compile.c bufferWriteData use after free (Issue 211)", "creation_timestamp": "2024-02-15T13:21:49.000000Z"}, {"uuid": "a465affe-72ca-45f5-a883-c1047b9d099e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22922", "type": "seen", "source": "https://t.me/arpsyndicate/3008", "content": "#ExploitObserverAlert\n\nCVE-2024-22922\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-22922. An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php", "creation_timestamp": "2024-01-26T17:12:10.000000Z"}, {"uuid": "36074438-3966-4cc7-a407-5e949e6023a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22920", "type": "seen", "source": "https://t.me/arpsyndicate/2967", "content": "#ExploitObserverAlert\n\nCVE-2024-22920\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-22920. swftools 0.9.2 was discovered to contain a heap-use-after-free via the function bufferWriteData in swftools/lib/action/compile.c.", "creation_timestamp": "2024-01-21T09:33:28.000000Z"}, {"uuid": "5c6981e8-35d5-4331-8fb1-34a98291d453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22923", "type": "seen", "source": "https://t.me/ctinow/199109", "content": "https://ift.tt/jsPqAwU\nCVE-2024-22923 | Adv Radius 2.2.5 Script sql injection", "creation_timestamp": "2024-03-04T09:41:36.000000Z"}, {"uuid": "8e407fed-3eb8-4369-be97-8653dd423bd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22927", "type": "seen", "source": "https://t.me/ctinow/192618", "content": "https://ift.tt/8vM5FkA\nCVE-2024-22927 | EyouCMS 1.6.5 URL func cross site scripting (Issue 57)", "creation_timestamp": "2024-02-24T15:16:46.000000Z"}, {"uuid": "ccad1197-9038-4b5f-92ba-64b2671a901b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22922", "type": "seen", "source": "https://t.me/ctinow/187344", "content": "https://ift.tt/8gJZmst\nCVE-2024-22922 | Project Worlds Visitor Management Systemin 1.0 Login Page POST/index.php privileges management", "creation_timestamp": "2024-02-18T19:16:29.000000Z"}, {"uuid": "dd4cda54-6e5f-4229-b86e-6d81828f12a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22927", "type": "seen", "source": "https://t.me/ctinow/178234", "content": "https://ift.tt/835yRc6\nCVE-2024-22927 Exploit", "creation_timestamp": "2024-02-02T19:17:06.000000Z"}, {"uuid": "062a0faa-22a5-437f-9786-fe45da9a221a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22923", "type": "seen", "source": "https://t.me/ctinow/183972", "content": "https://ift.tt/dYprTgQ\nCVE-2024-22923", "creation_timestamp": "2024-02-13T17:22:03.000000Z"}, {"uuid": "44385c7d-cb8c-4b69-a9ca-e641ceada43b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22927", "type": "seen", "source": "https://t.me/ctinow/177843", "content": "https://ift.tt/mcQRfTY\nCVE-2024-22927", "creation_timestamp": "2024-02-02T00:26:29.000000Z"}, {"uuid": "1115bad1-eda9-4955-8ad7-0728de5b14d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22922", "type": "seen", "source": "https://t.me/ctinow/173871", "content": "https://ift.tt/rgsZel9\nCVE-2024-22922", "creation_timestamp": "2024-01-25T23:26:51.000000Z"}, {"uuid": "58aeb618-aaee-4ec6-a9ca-50e779c941a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22920", "type": "seen", "source": "https://t.me/ctinow/173865", "content": "https://ift.tt/A2XvleI\nCVE-2024-22920 Exploit", "creation_timestamp": "2024-01-25T23:16:33.000000Z"}]}