{"vulnerability": "CVE-2024-2330", "sightings": [{"uuid": "7051e9dc-85ab-4af7-887c-209201380223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2330", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-15)", "content": "", "creation_timestamp": "2024-12-15T00:00:00.000000Z"}, {"uuid": "353fd0da-e092-4382-a01e-970fd44adb77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2330", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "a8c4f52c-48d8-4fb2-8f57-bc864c9b5058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23309", "type": "seen", "source": "https://t.me/cvedetector/9434", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23309 - LevelOne WBR-6012 Router Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-23309 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:52:10.000000Z"}, {"uuid": "bb6bb0c3-16db-4885-ae63-dbc5c7a8f6ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23305", "type": "seen", "source": "https://t.me/arpsyndicate/3776", "content": "#ExploitObserverAlert\n\nCVE-2024-23305\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-23305. An out-of-bounds write vulnerability exists in the BrainVisionMarker Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vmrk file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-02-21T13:42:31.000000Z"}, {"uuid": "eabe5204-640d-462c-a472-64d08a2544d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23302", "type": "seen", "source": "https://t.me/ctinow/196126", "content": "https://ift.tt/lke6Tcr\nCVE-2024-23302", "creation_timestamp": "2024-02-29T03:02:54.000000Z"}, {"uuid": "871d094c-06d6-4e6e-9def-d808b3356b83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23301", "type": "seen", "source": "https://t.me/arpsyndicate/2791", "content": "#ExploitObserverAlert\n\nCVE-2024-23301\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23301. Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.", "creation_timestamp": "2024-01-15T14:56:52.000000Z"}, {"uuid": "a19ea915-b28c-446c-b1c0-905db3f88947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23300", "type": "seen", "source": "https://t.me/ctinow/206217", "content": "https://ift.tt/xjVMfvJ\nCVE-2024-23300", "creation_timestamp": "2024-03-12T22:21:44.000000Z"}, {"uuid": "ce8b78a0-ffeb-47dd-871f-b6ca1e57033f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23302", "type": "seen", "source": "https://t.me/ctinow/196109", "content": "https://ift.tt/lke6Tcr\nCVE-2024-23302", "creation_timestamp": "2024-02-29T02:56:22.000000Z"}, {"uuid": "85d3fb80-717c-457f-849f-0dcab3bdece1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23300", "type": "seen", "source": "https://t.me/ctinow/206229", "content": "https://ift.tt/xjVMfvJ\nCVE-2024-23300", "creation_timestamp": "2024-03-12T22:26:49.000000Z"}, {"uuid": "017f2bd3-efd4-44ac-95cd-18d1ba6e998c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2330", "type": "seen", "source": "https://t.me/ctinow/203872", "content": "https://ift.tt/7Tc8Jez\nCVE-2024-2330", "creation_timestamp": "2024-03-09T10:31:46.000000Z"}, {"uuid": "7af6089d-f9ef-4930-9083-82d99fed313c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2330", "type": "seen", "source": "https://t.me/ctinow/203871", "content": "https://ift.tt/7Tc8Jez\nCVE-2024-2330", "creation_timestamp": "2024-03-09T10:26:46.000000Z"}, {"uuid": "632a7c3d-6d54-480c-a805-ec26ccaec900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23305", "type": "seen", "source": "https://t.me/ctinow/188749", "content": "https://ift.tt/jHKgESc\nCVE-2024-23305", "creation_timestamp": "2024-02-20T17:25:32.000000Z"}, {"uuid": "2d0f9a91-793e-4e13-8be7-6e35f59ed2a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23304", "type": "seen", "source": "https://t.me/ctinow/196916", "content": "https://ift.tt/vn6AIYD\nCVE-2024-23304 | Cybozu KUNAI 3.0.20/3.0.21 on Android denial of service", "creation_timestamp": "2024-02-29T18:56:49.000000Z"}, {"uuid": "c0c94fbc-5228-4cd1-b36d-928ec1ce2b67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23305", "type": "seen", "source": "https://t.me/ctinow/188760", "content": "https://ift.tt/jHKgESc\nCVE-2024-23305", "creation_timestamp": "2024-02-20T17:25:47.000000Z"}, {"uuid": "540c9435-cc25-4d5f-aa3c-d01c2d18b017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23301", "type": "seen", "source": "https://t.me/ctinow/168162", "content": "https://ift.tt/Lb2MQzH\nCVE-2024-23301", "creation_timestamp": "2024-01-15T06:36:45.000000Z"}, {"uuid": "648d4a15-fa8b-4449-b9c1-5b0bdc4bbebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23307", "type": "seen", "source": "https://t.me/ctinow/187236", "content": "https://ift.tt/tMx7epH\nCVE-2024-23307 | Linux Kernel up to 6.7 integer overflow", "creation_timestamp": "2024-02-18T13:06:40.000000Z"}, {"uuid": "fe567580-fae4-45c4-b65d-e93ff7572c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23301", "type": "seen", "source": "https://t.me/ctinow/178420", "content": "https://ift.tt/qEpi85o\nCVE-2024-23301 | Relax-and-Recover up to 2.7 information disclosure (Issue 3122)", "creation_timestamp": "2024-02-03T08:11:23.000000Z"}, {"uuid": "4875b54b-0f53-49ea-a3c2-8a7cd20e1bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23304", "type": "seen", "source": "https://t.me/ctinow/179770", "content": "https://ift.tt/sPpjxQH\nCVE-2024-23304", "creation_timestamp": "2024-02-06T06:31:11.000000Z"}, {"uuid": "6fb8904f-3aa9-4efc-8736-5fa9c8a23beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23301", "type": "seen", "source": "https://t.me/ctinow/167628", "content": "https://ift.tt/BFfAJGS\nCVE-2024-23301", "creation_timestamp": "2024-01-13T00:26:42.000000Z"}, {"uuid": "f77e5ddc-14a8-48bb-9809-d5b09df9752d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23307", "type": "seen", "source": "https://t.me/ctinow/173318", "content": "https://ift.tt/eGJ4PkD\nCVE-2024-23307", "creation_timestamp": "2024-01-25T08:26:44.000000Z"}]}