{"vulnerability": "CVE-2024-26304", "sightings": [{"uuid": "e35a4966-0e54-4cb1-80b7-7110c3827bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/5/kritische-sicherheitslucken-in-arubaos-updates-verfugbar", "content": "", "creation_timestamp": "2024-05-02T09:46:45.000000Z"}, {"uuid": "c60b9330-441f-4016-9398-ed97418e1b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8681", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS\nURL\uff1ahttps://github.com/X-Projetion/CVE-2024-26304-RCE-exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-05T01:42:45.000000Z"}, {"uuid": "e90817b1-3d22-45ac-b2dd-d8c3370e3920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\nURL\uff1ahttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-04T10:14:32.000000Z"}, {"uuid": "bab91cd4-2fdd-49a2-a348-f79f1b4d4c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/vGITFBuYOY6b2kqFTfQRnZw6GZXPc1CchSQCXTIDmInvWg", "content": "", "creation_timestamp": "2024-05-03T07:56:39.000000Z"}, {"uuid": "e06fc241-6c9b-4ffc-a437-5682cc0a22a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/HVh7Vx_8Pxozw0XFE4u9l-sjC-DtBX2SBytfzSHOTwEV1zs", "content": "", "creation_timestamp": "2024-05-03T07:24:45.000000Z"}, {"uuid": "949e6f7b-9550-43e6-8b9a-21e0e229106b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "Telegram/617isV9DWDaecD5DhruuT2oO0A7CuI80HPoCIlb3qp8V7w", "content": "", "creation_timestamp": "2024-10-05T15:19:46.000000Z"}, {"uuid": "cc65214d-4f19-4832-924b-530c00224464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1793", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:11.000000Z"}, {"uuid": "6809a469-385f-4dfc-8054-9afd31ecb107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2173", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T14:15:24.000000Z"}, {"uuid": "15c6b4a3-a17f-4200-b82e-becd45bd3996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1652", "content": "CVE-2024-26304 RCE-exploit\n*\nHPE Aruba Device\n*\nusage:\npython3 CVE-2024-26304.py -u http://127.0.0.1", "creation_timestamp": "2024-10-04T23:34:23.000000Z"}, {"uuid": "2dd6030e-fdac-421f-9231-9f3e748b3883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/5254", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:08.000000Z"}, {"uuid": "180e2a24-d549-4c5a-b9e5-25c8ecb2c1f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19219", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T14:15:24.000000Z"}, {"uuid": "05384c98-1383-4fcd-9e77-582223c5649a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/bUW83q2BaozOWvsBXtebtZUIutlySf2YSDxMjfMMk1oaIQ", "content": "", "creation_timestamp": "2024-05-03T08:17:04.000000Z"}, {"uuid": "3a5a9b6a-d5ab-4359-aeb7-d4bdf79bda4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/6818", "content": "The Hacker News\nFour Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the&nbsp;10&nbsp;security defects, four are rated critical in severity -\n\nCVE-2024-26304&nbsp;(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:56:40.000000Z"}, {"uuid": "14124c00-1dd8-4a56-89bb-8d7908e14f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/KomunitiSiber/1885", "content": "Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\nhttps://thehackernews.com/2024/05/four-critical-vulnerabilities-expose.html\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the\u00a010\u00a0security defects, four are rated critical in severity -\n\nCVE-2024-26304\u00a0(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:46:48.000000Z"}, {"uuid": "1390ddad-5cc6-4168-b681-c56aa4bed2ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1268", "content": "The Hacker News\nFour Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the&nbsp;10&nbsp;security defects, four are rated critical in severity -\n\nCVE-2024-26304&nbsp;(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:56:40.000000Z"}, {"uuid": "87830a8b-74e6-456d-9c04-412c61b5ae79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2292", "content": "CVE-2024-26304 RCE-exploit\n*\nHPE Aruba Device\n*\nusage:\npython3 CVE-2024-26304.py -u http://127.0.0.1", "creation_timestamp": "2024-10-04T22:36:05.000000Z"}, {"uuid": "f0de9f42-ba73-4c73-9547-13a59284aba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3281", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T15:19:57.000000Z"}, {"uuid": "100ac9c3-6347-4a37-ac86-66526eba1727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3282", "content": "https://github.com/X-Projetion/CVE-2024-26304-RCE-exploit\n\nCVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS\n#github #exploit", "creation_timestamp": "2024-10-06T08:46:43.000000Z"}, {"uuid": "3378a11c-28c7-4a44-b59d-3c525761a083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/true_secator/5691", "content": "HPE Aruba Networking \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0447\u0435\u0442\u044b\u0440\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041e\u0421 ArubaOS \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS v3.1: 9.8.\n\n\u0412\u0441\u0435 \u043e\u043d\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 HPE Aruba Networking Mobility Conductor, \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u044b, \u0448\u043b\u044e\u0437\u044b WLAN \u0438 \u0448\u043b\u044e\u0437\u044b SD-WAN, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 Aruba Central, ArubaOS 10.5.1.0 \u0438 \u043d\u0438\u0436\u0435, 10.4.1.0 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, 8.11.2.1 \u0438 \u043d\u0438\u0436\u0435, 8.10.0.10 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 ArubaOS \u0438 SD-WAN, \u0434\u043e\u0441\u0442\u0438\u0433\u0448\u0438\u0435 EoL.\n\n\u041f\u0435\u0440\u0432\u0430\u044f, CVE-2024-26305 \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b ArubaOS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b \u043d\u0430 UDP-\u043f\u043e\u0440\u0442 PAPI.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 CVE-2024-26304 \u0438 CVE-2024-33511 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0441\u043b\u0443\u0436\u0431\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f L2/L3 \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0442\u0447\u0435\u0442\u043e\u0432, \u0438\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043d\u0430 \u043f\u043e\u0440\u0442 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 PAPI, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f CVE-2024-33512, - \u044d\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b PAPI.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043d\u0438\u043c\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u043b  \u0435\u0449\u0435 \u0448\u0435\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u0437\u043e\u0432 DoS \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 HPE Aruba Networking \u043d\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0444\u0430\u043a\u0442\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 PoC, \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c Enhanced PAPI Security \u0438 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2024-05-02T12:36:15.000000Z"}, {"uuid": "8c6071b7-10d6-4907-8678-7d0293d1b75a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11232", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-05T21:23:25.000000Z"}]}