{"vulnerability": "CVE-2024-2344", "sightings": [{"uuid": "02b6ecf1-7f95-44fe-9dcd-4db241aea0e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23447", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13260", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23447\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: An issue was discovered in the Windows Network Drive Connector when using Document Level Security to assign permissions to a file, with explicit allow write and deny read. Although the document is not accessible to the user in Network Drive it is visible in search applications to the user.\n\ud83d\udccf Published: 2024-02-07T03:46:25.217Z\n\ud83d\udccf Modified: 2025-04-24T15:58:33.020Z\n\ud83d\udd17 References:\n1. https://discuss.elastic.co/t/elastic-network-drive-connector-8-12-1-security-update-esa-2024-02/352687\n2. https://www.elastic.co/community/security", "creation_timestamp": "2025-04-24T16:06:39.000000Z"}, {"uuid": "dc4b5d29-9c16-480c-9579-b39b5efd7c5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23448", "type": "seen", "source": "https://t.me/ctinow/198254", "content": "https://ift.tt/OQrLyAF\nCVE-2024-23448 | Elastic APM Server up to 8.12.0 Error log file", "creation_timestamp": "2024-03-02T07:36:45.000000Z"}, {"uuid": "e572bfdd-4022-4e16-9e83-0859a8d9e681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23444", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10588", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23444\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.\n\ud83d\udccf Published: 2024-07-31T17:26:12.784Z\n\ud83d\udccf Modified: 2025-04-04T23:03:01.974Z\n\ud83d\udd17 References:\n1. https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-23-security-update-esa-2024-12/364157", "creation_timestamp": "2025-04-04T23:37:52.000000Z"}, {"uuid": "2020fb71-de6e-471f-8586-91235047674d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18599", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23441\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vba32 Antivirus v3.36.0 is vulnerable to a Denial of Service vulnerability by triggering the 0x2220A7 IOCTL code of the Vba32m64.sys driver.\n\ud83d\udccf Published: 2024-01-29T16:06:17.742Z\n\ud83d\udccf Modified: 2025-06-17T14:26:53.139Z\n\ud83d\udd17 References:\n1. https://fluidattacks.com/advisories/rollins/\n2. https://www.anti-virus.by/vba32", "creation_timestamp": "2025-06-17T14:40:06.000000Z"}, {"uuid": "26164653-aa57-4868-8bfd-a530f97478d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23444", "type": "seen", "source": "https://t.me/cvedetector/2162", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23444 - Elasticsearch elasticsearch-certutil Unencrypted Private Key Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-23444 \nPublished : July 31, 2024, 6:15 p.m. | 40\u00a0minutes ago \nDescription : It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T21:01:14.000000Z"}, {"uuid": "795bf359-7cc7-43e5-8e5d-bfaf7808a0df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23447", "type": "seen", "source": "https://t.me/ctinow/197687", "content": "https://ift.tt/czysk4b\nCVE-2024-23447 | Elastic Network Drive Connector up to 8.12.0 on Windows access control", "creation_timestamp": "2024-03-01T15:16:44.000000Z"}, {"uuid": "edf445b0-7703-4cb4-b59d-2aaf2e9a8c98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23440", "type": "seen", "source": "https://t.me/ctinow/183930", "content": "https://ift.tt/0cBEdKM\nCVE-2024-23440", "creation_timestamp": "2024-02-13T16:22:18.000000Z"}, {"uuid": "86e16e7c-8aae-4834-ac04-7112a13ef276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23448", "type": "seen", "source": "https://t.me/ctinow/181033", "content": "https://ift.tt/5TEeGOs\nCVE-2024-23448", "creation_timestamp": "2024-02-07T23:31:59.000000Z"}, {"uuid": "ac7c5639-f115-45f4-bfa9-c48ab1d2dbc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23441", "type": "seen", "source": "https://t.me/ctinow/179500", "content": "https://ift.tt/g0APTJh\nCVE-2024-23441 Exploit", "creation_timestamp": "2024-02-05T21:16:42.000000Z"}, {"uuid": "dde17a6d-7de0-48a2-813c-f0aa86e43c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23447", "type": "seen", "source": "https://t.me/ctinow/180524", "content": "https://ift.tt/oGnWKPw\nCVE-2024-23447", "creation_timestamp": "2024-02-07T05:31:53.000000Z"}, {"uuid": "6528ec20-246c-4789-88cd-67ef96241a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23446", "type": "seen", "source": "https://t.me/ctinow/180523", "content": "https://ift.tt/H1FdmS4\nCVE-2024-23446", "creation_timestamp": "2024-02-07T05:31:52.000000Z"}, {"uuid": "d68ced9e-92b9-4306-a134-b1f837cced70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23441", "type": "seen", "source": "https://t.me/ctinow/175411", "content": "https://ift.tt/muILvM1\nCVE-2024-23441", "creation_timestamp": "2024-01-29T17:31:57.000000Z"}]}