{"vulnerability": "CVE-2024-2398", "sightings": [{"uuid": "8a43ad8b-dd02-4810-a13a-d77beef23a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23983", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113466798175779241", "content": "", "creation_timestamp": "2024-11-11T22:58:59.496286Z"}, {"uuid": "683ffea0-17c9-4b95-8fea-d822062b4183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2398", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-04", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "579e17b0-d4fa-4deb-ad47-c40fd7b71ab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2398", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-16", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "21732ceb-079b-4a83-9f31-912565a74504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23983", "type": "seen", "source": "https://t.me/cvedetector/10548", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23983 - Apache HTTP Server Request Smuggling\", \n  \"Content\": \"CVE ID : CVE-2024-23983 \nPublished : Nov. 11, 2024, 11:15 p.m. | 37\u00a0minutes ago \nDescription : Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T01:18:31.000000Z"}, {"uuid": "0bb479e8-94b9-41e1-bc22-93b8e4d3fa62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/ezserver_http.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "107c1d7c-ef8e-497e-9908-1fe8d3cf67a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "01cd82f4-7cda-467c-be4c-18e182945dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23984", "type": "seen", "source": "https://t.me/cvedetector/5743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23984 - Intel(R) Processors RAPL Interface Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-23984 \nPublished : Sept. 16, 2024, 5:16 p.m. | 14\u00a0minutes ago \nDescription : Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T19:32:35.000000Z"}, {"uuid": "34989049-4984-4477-b9e1-92390397c8cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "https://t.me/arpsyndicate/3117", "content": "#ExploitObserverAlert\n\nCVE-2024-23985\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-23985. EzServer 6.4.017 allows a denial of service (daemon crash) via a long string, such as one for the RNTO command.", "creation_timestamp": "2024-01-26T23:40:07.000000Z"}, {"uuid": "7c51c2c9-f528-4555-bf41-d16855f33b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2398", "type": "seen", "source": "https://t.me/arpsyndicate/4427", "content": "#ExploitObserverAlert\n\nCVE-2024-2398\n\nDESCRIPTION: Exploit Observer has 9 entries in 2 file formats related to CVE-2024-2398. When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T21:25:46.000000Z"}, {"uuid": "df898fe7-2713-42f0-8c0f-5a53cbd9fd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "https://t.me/ctinow/177782", "content": "https://ift.tt/kKyYWiR\nCVE-2024-23985 Exploit", "creation_timestamp": "2024-02-01T21:16:18.000000Z"}, {"uuid": "4c70dfdb-a122-423e-887e-5310e6c22dbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2398", "type": "seen", "source": "https://t.me/ctinow/216035", "content": "https://ift.tt/ra0DWp2\nInternet Bug Bounty: CVE-2024-2398: HTTP/2 push headers memory-leak", "creation_timestamp": "2024-04-23T13:46:41.000000Z"}, {"uuid": "8b58a82f-0004-405d-ad09-78eac53dd515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2398", "type": "seen", "source": "https://t.me/ctinow/212989", "content": "https://ift.tt/10CTE6u\ncurl: CVE-2024-2398: HTTP/2 push headers memory-leak", "creation_timestamp": "2024-03-27T11:46:35.000000Z"}, {"uuid": "0f619a48-1f59-4148-858b-4c835aab690f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "https://t.me/ctinow/187213", "content": "https://ift.tt/Nu7mDZV\nCVE-2024-23985 | EzServer 6.4.017 Daemon denial of service (ID 176663)", "creation_timestamp": "2024-02-18T11:06:14.000000Z"}, {"uuid": "15c35ee5-943a-4d30-a9b6-d774c8a17cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23985", "type": "seen", "source": "https://t.me/ctinow/173278", "content": "https://ift.tt/Dw4PsLf\nCVE-2024-23985", "creation_timestamp": "2024-01-25T06:26:17.000000Z"}]}