{"vulnerability": "CVE-2024-2475", "sightings": [{"uuid": "e6e74a69-d75b-455d-a3ee-2c1f6e12200b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24758", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-08", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "c2e64f98-54ef-4b24-9389-16111e818f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhcgtwozns2h", "content": "", "creation_timestamp": "2025-02-03T21:01:56.559546Z"}, {"uuid": "0b0ed1f6-4208-4331-b84d-c67a524ea221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-24759.yaml", "content": "", "creation_timestamp": "2025-01-04T05:46:54.000000Z"}, {"uuid": "7133a35f-7b6c-4807-9670-342f5450b141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "seen", "source": "https://t.me/CyberBulletin/580", "content": "\u26a1\ufe0fMindsDB Fixes Critical CVE-2024-24759: DNS Rebinding Attack Bypasses Security Protections.\n\n#CyberBulletin", "creation_timestamp": "2024-09-08T06:29:52.000000Z"}, {"uuid": "8eca93ff-c984-4cea-8038-2179465f6d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12508", "content": "\u200aMindsDB Fixes Critical CVE-2024-24759: DNS Rebinding Attack Bypasses Security Protections\n\nhttps://securityonline.info/mindsdb-fixes-critical-cve-2024-24759-dns-rebinding-attack-bypasses-security-protections/", "creation_timestamp": "2024-09-08T17:48:05.000000Z"}, {"uuid": "3a6663b4-5d52-421d-80ab-fc5c283fffd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "seen", "source": "https://t.me/cvedetector/4933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-24759 - MindsDB Server-Side Request Forgery (SSRF) and Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-24759 \nPublished : Sept. 5, 2024, 5:15 p.m. | 26\u00a0minutes ago \nDescription : MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T19:43:06.000000Z"}, {"uuid": "e3bf207a-5cf2-4734-b770-ef1272fb0ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/791", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-09T14:49:02.000000Z"}, {"uuid": "ce4644b8-6032-47e7-851b-49b9d4f10b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24758", "type": "seen", "source": "https://t.me/arpsyndicate/4525", "content": "#ExploitObserverAlert\n\nCVE-2024-24758\n\nDESCRIPTION: Exploit Observer has 8 entries in 1 file formats related to CVE-2024-24758. Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T05:22:30.000000Z"}, {"uuid": "14b0e282-4bb2-4da6-9fdc-0df5e6f2e997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/305", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-09T14:48:44.000000Z"}, {"uuid": "372b2268-7979-4fb8-b8e2-7f14a6798225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24757", "type": "seen", "source": "https://t.me/ctinow/192811", "content": "https://ift.tt/z6Gbyns\nCVE-2024-24757 | Degamisu open-irs up to 1.0.0 ENV File information disclosure (GHSA-7r69-3vwh-wcfr)", "creation_timestamp": "2024-02-25T10:11:11.000000Z"}, {"uuid": "6740acbc-793d-47b3-89bb-a6f34267f401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24750", "type": "seen", "source": "https://t.me/ctinow/203167", "content": "https://ift.tt/foXnPdx\nCVE-2024-24750 | Undici prior 6.6.1 fetch memory leak", "creation_timestamp": "2024-03-08T09:26:19.000000Z"}, {"uuid": "d7e9a558-eeef-4dfd-8eb1-136e1d4dcf73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24758", "type": "seen", "source": "https://t.me/ctinow/203166", "content": "https://ift.tt/lerPmO3\nCVE-2024-24758 | Undici Header Proxy-Authorization unknown vulnerability", "creation_timestamp": "2024-03-08T09:26:18.000000Z"}, {"uuid": "8d16180d-345d-48dd-8171-021d888c529f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24755", "type": "seen", "source": "https://t.me/ctinow/192642", "content": "https://ift.tt/FnU2qTK\nCVE-2024-24755 | discourse-group-membership-ip-block information disclosure (GHSA-r38c-cp8w-664m)", "creation_timestamp": "2024-02-24T16:11:32.000000Z"}, {"uuid": "5f6a1d43-14fe-41e6-9dba-0acc811c5725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24754", "type": "seen", "source": "https://t.me/ctinow/192511", "content": "https://ift.tt/zHPBYeQ\nCVE-2024-24754 | brefphp bref up to 2.1.12 RequestHandlerInterface interpretation conflict", "creation_timestamp": "2024-02-24T09:41:17.000000Z"}, {"uuid": "a7ee650e-98a6-4fec-b5a4-51ca6ebf6108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24753", "type": "seen", "source": "https://t.me/ctinow/192509", "content": "https://ift.tt/YOCLu8Z\nCVE-2024-24753 | brefphp bref up to 2.1.12 Response Header interpretation conflict", "creation_timestamp": "2024-02-24T09:41:15.000000Z"}, {"uuid": "5b4f3539-f2cb-4168-85ce-edf8c70ac0ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24752", "type": "seen", "source": "https://t.me/ctinow/192508", "content": "https://ift.tt/JAFMHvj\nCVE-2024-24752 | brefphp bref up to 2.1.12 Multipart Request /tmp RequestHandlerInterface resource consumption (GHSA-x4hh-frx8-98r5)", "creation_timestamp": "2024-02-24T09:41:13.000000Z"}, {"uuid": "253ba3f9-a0e5-4f02-935f-a50ae5d90dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24758", "type": "seen", "source": "https://t.me/ctinow/186690", "content": "https://ift.tt/zNSWfpv\nCVE-2024-24758", "creation_timestamp": "2024-02-16T23:21:52.000000Z"}, {"uuid": "c7c2aad6-7967-4f07-bc9b-a99620829094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24750", "type": "seen", "source": "https://t.me/ctinow/186689", "content": "https://ift.tt/svwWAuB\nCVE-2024-24750", "creation_timestamp": "2024-02-16T23:21:51.000000Z"}, {"uuid": "95f531fc-2c9a-453a-b68d-0398469566d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24751", "type": "seen", "source": "https://t.me/ctinow/184144", "content": "https://ift.tt/rKjozZy\nCVE-2024-24751", "creation_timestamp": "2024-02-13T20:22:19.000000Z"}, {"uuid": "901e8aa2-859b-45c8-a6e3-91af666e4a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24756", "type": "seen", "source": "https://t.me/ctinow/182319", "content": "https://ift.tt/210lRdj\nCVE-2024-24756 Exploit", "creation_timestamp": "2024-02-09T23:16:31.000000Z"}, {"uuid": "3476d116-0ef4-48bf-aebf-04981762a977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24758", "type": "seen", "source": "https://t.me/ctinow/187244", "content": "https://ift.tt/Sk7FycJ\nCVE-2024-24758", "creation_timestamp": "2024-02-18T13:21:49.000000Z"}, {"uuid": "c9698143-2120-4e2f-8230-625ba89c9b2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24756", "type": "seen", "source": "https://t.me/ctinow/177848", "content": "https://ift.tt/8y2bK4P\nCVE-2024-24756", "creation_timestamp": "2024-02-02T00:26:35.000000Z"}, {"uuid": "10af0489-03cf-417d-89a1-60344def1221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24754", "type": "seen", "source": "https://t.me/ctinow/177698", "content": "https://ift.tt/TuVac2w\nCVE-2024-24754", "creation_timestamp": "2024-02-01T17:31:56.000000Z"}, {"uuid": "dcf77555-313c-4bf4-a620-bd5fd96c29ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24753", "type": "seen", "source": "https://t.me/ctinow/177697", "content": "https://ift.tt/vEkuRpi\nCVE-2024-24753", "creation_timestamp": "2024-02-01T17:31:55.000000Z"}, {"uuid": "b08dc492-8876-4f4a-8d0e-f64fd34bcefd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24755", "type": "seen", "source": "https://t.me/ctinow/177826", "content": "https://ift.tt/JpZGnKi\nCVE-2024-24755", "creation_timestamp": "2024-02-01T23:26:38.000000Z"}, {"uuid": "af52784b-6b08-42a0-88d7-30b740d1df77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24752", "type": "seen", "source": "https://t.me/ctinow/177696", "content": "https://ift.tt/pNiWDmo\nCVE-2024-24752", "creation_timestamp": "2024-02-01T17:31:54.000000Z"}, {"uuid": "3a1f5c38-05af-4e56-b71d-4da4669f2420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24759", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11102", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-12T12:57:45.000000Z"}]}