{"vulnerability": "CVE-2024-2602", "sightings": [{"uuid": "26195104-f475-4565-a723-f6e72100f174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2602", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-03", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "a593ec91-2a69-4bde-ac3d-31a87706e49d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26021", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "deb0b210-e7c7-4760-8af9-115c179f1dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26021", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993212825999765", "content": "", "creation_timestamp": "2025-02-12T22:13:09.610165Z"}, {"uuid": "a9cf7285-9ba4-438e-9fa8-83cb913455e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26021", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz77w275l2g", "content": "", "creation_timestamp": "2025-02-12T22:16:41.910373Z"}, {"uuid": "c4e750db-5902-47c2-849c-e863762d4eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26027", "type": "seen", "source": "https://t.me/cvedetector/3145", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26027 - Intel Simics Package Manager Uncontrolled Search Path Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26027 \nPublished : Aug. 14, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Uncontrolled search path for some Intel(R) Simics Package Manager software before version 1.8.3 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T17:23:14.000000Z"}, {"uuid": "89bcdda9-4ea4-4035-87c0-eac501354f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26026", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7252", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION\nURL\uff1ahttps://github.com/passwa11/CVE-2024-26026\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-09T03:20:54.000000Z"}, {"uuid": "ebcde0c0-b263-4644-b680-75c1af9dbe29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26022", "type": "seen", "source": "https://t.me/cvedetector/3147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26022 - Intel UEFI Integrator Tools Elevation of Privilege Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26022 \nPublished : Aug. 14, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Improper access control in some Intel(R) UEFI Integrator Tools on Aptio V for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T17:23:16.000000Z"}, {"uuid": "15521650-6d1b-4c7f-8f6e-7ea7b0b8cfd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26025", "type": "seen", "source": "https://t.me/cvedetector/3150", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26025 - Intel Advisor LPE\", \n  \"Content\": \"CVE ID : CVE-2024-26025 \nPublished : Aug. 14, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T17:23:19.000000Z"}, {"uuid": "38a4cc56-9fed-4786-a4c8-a8fb922b42d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2602", "type": "seen", "source": "https://t.me/cvedetector/651", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2602 - CWE-22: Improper Limitation of a Pathname to a Res\", \n  \"Content\": \"CVE ID : CVE-2024-2602 \nPublished : July 11, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path  \nTraversal') vulnerability exists that could result in remote code execution when an authenticated  \nuser executes a saved project file that has been tampered by a malicious actor. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T11:37:51.000000Z"}, {"uuid": "59043977-365a-4a37-bde9-486d0dc6ab46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26020", "type": "seen", "source": "https://t.me/cvedetector/1462", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26020 - Ankitects Anki MPV Flashcard Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26020 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : An arbitrary script execution vulnerability exists in the MPV functionality of Ankitects Anki 24.04. A specially crafted flashcard can lead to a arbitrary code execution. An attacker can send malicious flashcard to trigger this vulnerability. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:50:07.000000Z"}, {"uuid": "b8e60239-e632-4e76-a46f-3779d8340207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26028", "type": "seen", "source": "https://t.me/ctinow/210870", "content": "https://ift.tt/h0ZJM5i\nCVE-2024-26028", "creation_timestamp": "2024-03-18T19:27:10.000000Z"}, {"uuid": "1edcb2c6-ff4e-4c6c-8ac9-fa2439c85203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26026", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2449", "content": "https://github.com/passwa11/CVE-2024-26026\n\nCVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION\n#github #poc", "creation_timestamp": "2024-05-09T08:36:33.000000Z"}, {"uuid": "c04219f3-91eb-42a8-8d76-60129f7d1b36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26026", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10476", "content": "#Threat_Research\n1. Big Vulnerabilities in Next-Gen BIG-IP (CVE-2024-21793, CVE-2024-26026)\nhttps://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip\n2. Analysis of ArcaneDoor Threat Infrastructure\nhttps://censys.com/analysis-of-arcanedoor-threat-infrastructure-suggests-potential-ties-to-chinese-based-actor", "creation_timestamp": "2024-05-18T17:36:28.000000Z"}]}