{"vulnerability": "CVE-2024-2477", "sightings": [{"uuid": "6a9186b7-c8ac-465b-b90c-b12b34e4dcab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24778", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljidmjoeni2u", "content": "", "creation_timestamp": "2025-03-03T16:10:28.132692Z"}, {"uuid": "1fb8a427-a90c-4ad8-b9e9-85da20c0665a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24778", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:47.000000Z"}, {"uuid": "2074f523-6f52-4ba8-8f99-160f6ed33a6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24778", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "d3654f20-ee3a-4ade-8943-5c834f7ace56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24778", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6192", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24778\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper privilege management in a REST interface allowed registered users to access unauthorized resources if the resource ID was know. \n\n\n\n\n\nThis issue affects Apache StreamPipes: through 0.95.1.\n\nUsers are recommended to upgrade to version 0.97.0 which fixes the issue.\n\ud83d\udccf Published: 2025-03-03T10:37:04.509Z\n\ud83d\udccf Modified: 2025-03-03T10:37:04.509Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/j14w6wghlwwrgfgc6hoz9f94fwxtlgzh", "creation_timestamp": "2025-03-03T11:30:21.000000Z"}, {"uuid": "1c29a9b9-e64a-4da0-8bfc-27f4f4d82de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24772", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4066", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24772\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-02-28T12:15:47.273\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5\n2. http://www.openwall.com/lists/oss-security/2024/02/28/5\n3. https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5", "creation_timestamp": "2025-02-12T11:10:39.000000Z"}, {"uuid": "36c1068b-9bfb-4e40-b3e1-4596116ebd96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24772", "type": "seen", "source": "Telegram/SI14b78UygFilPmS1CyUscA_R80j7BvAJiw204qhAA-eCb7f", "content": "", "creation_timestamp": "2025-02-14T10:04:57.000000Z"}, {"uuid": "34f83f2e-b763-4cd9-99e8-e341f7247ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24777", "type": "seen", "source": "https://t.me/cvedetector/9435", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-24777 - LevelOne WBR-6012 Web Application CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-24777 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : A cross-site request forgery (CSRF) vulnerability exists in the Web Application functionality of the LevelOne WBR-6012 R0.40e6. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious web page to trigger this vulnerability. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:52:11.000000Z"}, {"uuid": "c90d08e7-80a3-4611-8b99-adeaff54f370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24770", "type": "seen", "source": "https://t.me/ctinow/208103", "content": "https://ift.tt/EsoOaFY\nCVE-2024-24770", "creation_timestamp": "2024-03-14T20:27:00.000000Z"}, {"uuid": "160d7c00-a2f3-43db-a164-364769a38962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24770", "type": "seen", "source": "https://t.me/ctinow/208117", "content": "https://ift.tt/EsoOaFY\nCVE-2024-24770", "creation_timestamp": "2024-03-14T20:32:02.000000Z"}, {"uuid": "e84eda35-c608-4a1c-84a4-69b2b3c39a59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24776", "type": "seen", "source": "https://t.me/ctinow/182116", "content": "https://ift.tt/pFrLH6m\nCVE-2024-24776", "creation_timestamp": "2024-02-09T16:27:10.000000Z"}, {"uuid": "3899e725-71a3-460f-8cea-1ce8d1ac2ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24774", "type": "seen", "source": "https://t.me/ctinow/198589", "content": "https://ift.tt/Vdep9Da\nCVE-2024-24774 | Mattermost up to 8.1.7 Jira Plugin authorization", "creation_timestamp": "2024-03-03T07:36:34.000000Z"}, {"uuid": "5429caec-4d6c-44cd-8bbf-5351a533a59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24776", "type": "seen", "source": "https://t.me/ctinow/198588", "content": "https://ift.tt/gDaYm5Z\nCVE-2024-24776 | Mattermost up to 8.1.7/9.4.0 API member_count access control", "creation_timestamp": "2024-03-03T07:36:33.000000Z"}, {"uuid": "2c61844b-81c5-4a57-8747-841d112f7d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24771", "type": "seen", "source": "https://t.me/ctinow/197975", "content": "https://ift.tt/oQYf7EX\nCVE-2024-24771 | open-formulieren open-forms up to 2.2.8/2.3.6/2.4.4/2.5.1 /admin/login/ improper authentication (GHSA-64r3-x3gf-vp63)", "creation_timestamp": "2024-03-01T20:46:42.000000Z"}, {"uuid": "29ad02d5-45f4-4776-b68d-cb6eb8f543f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24773", "type": "seen", "source": "https://t.me/ctinow/195417", "content": "https://ift.tt/JujAYHz\nCVE-2024-24773", "creation_timestamp": "2024-02-28T13:26:43.000000Z"}, {"uuid": "9b54792d-48a3-4748-8434-4d290c483a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24772", "type": "seen", "source": "https://t.me/ctinow/195416", "content": "https://ift.tt/buGyzoE\nCVE-2024-24772", "creation_timestamp": "2024-02-28T13:26:42.000000Z"}, {"uuid": "98f086bd-3a6b-4c2a-b234-db89f60c2de6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24773", "type": "seen", "source": "https://t.me/ctinow/195423", "content": "https://ift.tt/JujAYHz\nCVE-2024-24773", "creation_timestamp": "2024-02-28T13:26:52.000000Z"}, {"uuid": "62034c22-e251-4ea1-924e-180a5048e089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24771", "type": "seen", "source": "https://t.me/ctinow/180792", "content": "https://ift.tt/OncAIs5\nCVE-2024-24771", "creation_timestamp": "2024-02-07T16:22:19.000000Z"}, {"uuid": "c096b6b2-1b9b-4167-98f0-9b9fc20f0f7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24779", "type": "seen", "source": "https://t.me/ctinow/195424", "content": "https://ift.tt/RGMFpvi\nCVE-2024-24779", "creation_timestamp": "2024-02-28T13:26:53.000000Z"}, {"uuid": "d7252ca7-7e16-42ef-883a-1cb017f19b22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24772", "type": "seen", "source": "https://t.me/ctinow/195422", "content": "https://ift.tt/buGyzoE\nCVE-2024-24772", "creation_timestamp": "2024-02-28T13:26:48.000000Z"}, {"uuid": "f85c45fa-fa46-4e7e-81bc-e4fb1d2364f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24779", "type": "seen", "source": "https://t.me/ctinow/195418", "content": "https://ift.tt/RGMFpvi\nCVE-2024-24779", "creation_timestamp": "2024-02-28T13:26:44.000000Z"}, {"uuid": "647fd40c-9da2-4157-8563-2bd8056f23c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24774", "type": "seen", "source": "https://t.me/ctinow/182115", "content": "https://ift.tt/iaPlgE1\nCVE-2024-24774", "creation_timestamp": "2024-02-09T16:27:09.000000Z"}]}