{"vulnerability": "CVE-2024-2375", "sightings": [{"uuid": "d266329f-770d-4acf-9ab5-ef69ecf9b621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "fb3adcb1-22cc-4898-8cd4-41e737a7b03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "e1198d05-bfad-4899-b6d3-54da97b47fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:00.000000Z"}, {"uuid": "14cbc30c-29a3-4dbb-a51d-45b8bc06bbca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15433", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23759\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Deserialization of Untrusted Data in Gambio through 4.9.2.0 allows attackers to run arbitrary code via \"search\" parameter of the Parcelshopfinder/AddAddressBookEntry\" function.\n\ud83d\udccf Published: 2024-02-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T20:59:58.075Z\n\ud83d\udd17 References:\n1. https://herolab.usd.de/security-advisories/usd-2023-0046/", "creation_timestamp": "2025-05-07T21:22:50.000000Z"}, {"uuid": "cc1c63ae-8bd4-4c15-a286-1559ddd0f396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/gambio_unauth_rce_cve_2024_23759.rb", "content": "", "creation_timestamp": "2024-04-19T19:35:28.000000Z"}, {"uuid": "41f393d8-3869-408a-993a-0b11eebeb522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23758", "type": "seen", "source": "https://t.me/arpsyndicate/3899", "content": "#ExploitObserverAlert\n\nCVE-2024-23758\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-23758. An issue discovered in Unisys Stealth 5.3.062.0 allows attackers to view sensitive information via the Enterprise ManagementInstaller_msi.log file.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-22T03:46:04.000000Z"}, {"uuid": "b2731fbb-2b30-451e-b757-16cd19adfade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/arpsyndicate/4731", "content": "#ExploitObserverAlert\n\nCVE-2024-23759\n\nDESCRIPTION: Exploit Observer has 5 entries in 2 file formats related to CVE-2024-23759. Deserialization of Untrusted Data in Gambio through 4.9.2.0 allows attackers to run arbitrary code via \"search\" parameter of the Parcelshopfinder/AddAddressBookEntry\" function.\n\nFIRST-EPSS: 0.327070000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9115431", "creation_timestamp": "2024-04-21T11:29:32.000000Z"}, {"uuid": "6cd83e4e-5425-41c2-acfb-cb3fae369c9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23756", "type": "seen", "source": "https://t.me/ctinow/198396", "content": "https://ift.tt/RNV24Oi\nCVE-2024-23756 | Plone Official Docker 5.2.13 HTTP Method access control", "creation_timestamp": "2024-03-02T15:46:15.000000Z"}, {"uuid": "b71bb3c9-7afd-4c2f-a331-b2a663f62368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23750", "type": "seen", "source": "https://t.me/ctinow/186186", "content": "https://ift.tt/v6taPuR\nCVE-2024-23750 | geekan MetaGPT up to 0.6.4 RunCode.run_script os command injection (Issue 731)", "creation_timestamp": "2024-02-16T08:46:13.000000Z"}, {"uuid": "02f2123c-f642-46ba-ab75-d80f9f6887d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23758", "type": "seen", "source": "https://t.me/ctinow/189037", "content": "https://ift.tt/jchbLAa\nCVE-2024-23758", "creation_timestamp": "2024-02-21T00:31:22.000000Z"}, {"uuid": "62504a19-5038-4c4a-a842-6cd710d99e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23758", "type": "seen", "source": "https://t.me/ctinow/189036", "content": "https://ift.tt/jchbLAa\nCVE-2024-23758", "creation_timestamp": "2024-02-21T00:31:21.000000Z"}, {"uuid": "f27ca738-ae1a-4ea4-a592-3678511302a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/ctinow/183490", "content": "https://ift.tt/rgQuwCJ\nCVE-2024-23759", "creation_timestamp": "2024-02-12T23:26:14.000000Z"}, {"uuid": "205cc031-fd59-46d3-80db-25a5efc60592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/ctinow/185327", "content": "https://ift.tt/iqTprsZ\nCVE-2024-23759 Exploit", "creation_timestamp": "2024-02-15T08:17:07.000000Z"}, {"uuid": "e3b7cf8c-0817-460e-8b04-0849728ed7bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23751", "type": "seen", "source": "https://t.me/ctinow/186171", "content": "https://ift.tt/yziADn0\nCVE-2024-23751 | LlamaIndex up to 0.9.34 Text-to-SQL sql injection (Issue 9957)", "creation_timestamp": "2024-02-16T08:16:37.000000Z"}, {"uuid": "92f778a3-de69-41b5-91be-28d9b9603ab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23752", "type": "seen", "source": "https://t.me/ctinow/186167", "content": "https://ift.tt/O3NPZxl\nCVE-2024-23752 | PandasAI up to 1.5.17 Python Code synthetic_dataframe code injection (Issue 868)", "creation_timestamp": "2024-02-16T08:16:33.000000Z"}, {"uuid": "150657cb-03a8-4cec-8d3b-d01bfc2bd564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23756", "type": "seen", "source": "https://t.me/ctinow/185796", "content": "https://ift.tt/2jcsGqa\nCVE-2024-23756 Exploit", "creation_timestamp": "2024-02-15T19:17:07.000000Z"}, {"uuid": "6f788119-79d5-41f9-ba63-f30ed158386f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23756", "type": "seen", "source": "https://t.me/ctinow/181661", "content": "https://ift.tt/lXpbNwC\nCVE-2024-23756", "creation_timestamp": "2024-02-08T22:26:04.000000Z"}, {"uuid": "e20d6de4-05d7-49a1-8788-6d8ac3166115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23752", "type": "seen", "source": "https://t.me/ctinow/170954", "content": "https://ift.tt/Jat12Rh\nCVE-2024-23752", "creation_timestamp": "2024-01-22T02:21:35.000000Z"}, {"uuid": "38ff5b25-9cb7-4245-9a61-7e52e85e4bff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23751", "type": "seen", "source": "https://t.me/ctinow/170953", "content": "https://ift.tt/WS1e9Eo\nCVE-2024-23751", "creation_timestamp": "2024-01-22T02:21:34.000000Z"}, {"uuid": "cfc4009e-7da9-47dd-b5c6-044a7720d79e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23750", "type": "seen", "source": "https://t.me/ctinow/170952", "content": "https://ift.tt/erGWhKc\nCVE-2024-23750", "creation_timestamp": "2024-01-22T02:21:33.000000Z"}]}