{"vulnerability": "CVE-2024-23759", "sightings": [{"uuid": "fb3adcb1-22cc-4898-8cd4-41e737a7b03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "e1198d05-bfad-4899-b6d3-54da97b47fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:00.000000Z"}, {"uuid": "d266329f-770d-4acf-9ab5-ef69ecf9b621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "14cbc30c-29a3-4dbb-a51d-45b8bc06bbca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15433", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23759\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Deserialization of Untrusted Data in Gambio through 4.9.2.0 allows attackers to run arbitrary code via \"search\" parameter of the Parcelshopfinder/AddAddressBookEntry\" function.\n\ud83d\udccf Published: 2024-02-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T20:59:58.075Z\n\ud83d\udd17 References:\n1. https://herolab.usd.de/security-advisories/usd-2023-0046/", "creation_timestamp": "2025-05-07T21:22:50.000000Z"}, {"uuid": "cc1c63ae-8bd4-4c15-a286-1559ddd0f396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/gambio_unauth_rce_cve_2024_23759.rb", "content": "", "creation_timestamp": "2024-04-19T19:35:28.000000Z"}, {"uuid": "b2731fbb-2b30-451e-b757-16cd19adfade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/arpsyndicate/4731", "content": "#ExploitObserverAlert\n\nCVE-2024-23759\n\nDESCRIPTION: Exploit Observer has 5 entries in 2 file formats related to CVE-2024-23759. Deserialization of Untrusted Data in Gambio through 4.9.2.0 allows attackers to run arbitrary code via \"search\" parameter of the Parcelshopfinder/AddAddressBookEntry\" function.\n\nFIRST-EPSS: 0.327070000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9115431", "creation_timestamp": "2024-04-21T11:29:32.000000Z"}, {"uuid": "205cc031-fd59-46d3-80db-25a5efc60592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/ctinow/185327", "content": "https://ift.tt/iqTprsZ\nCVE-2024-23759 Exploit", "creation_timestamp": "2024-02-15T08:17:07.000000Z"}, {"uuid": "f27ca738-ae1a-4ea4-a592-3678511302a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23759", "type": "seen", "source": "https://t.me/ctinow/183490", "content": "https://ift.tt/rgQuwCJ\nCVE-2024-23759", "creation_timestamp": "2024-02-12T23:26:14.000000Z"}]}