{"vulnerability": "CVE-2024-2735", "sightings": [{"uuid": "8a4c2cfa-e8e7-4ddb-a0ea-aaab7bb5cde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27350", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3m6mcxqalku2r", "content": "", "creation_timestamp": "2025-11-27T11:58:33.433893Z"}, {"uuid": "aff022db-b359-4750-b32c-de1cecb608e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3m6mcxqalku2r", "content": "", "creation_timestamp": "2025-11-27T11:58:33.522702Z"}, {"uuid": "d1ecc87e-8cd7-46db-a72f-6b156550d6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/arpsyndicate/4254", "content": "#ExploitObserverAlert\n\nCVE-2024-27351\n\nDESCRIPTION: Exploit Observer has 48 entries in 6 file formats related to CVE-2024-27351. In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.", "creation_timestamp": "2024-03-16T21:03:26.000000Z"}, {"uuid": "01a55b25-a706-4878-a7a7-e0a3fc3f4fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27357", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:10.726112Z"}, {"uuid": "aea7bd47-b694-411e-be67-994fed3878f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27358", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:10.816905Z"}, {"uuid": "53807e49-a30f-4b99-b426-e4434b2d837a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27358", "type": "seen", "source": "https://t.me/cvedetector/1706", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27358 - WithSecure Elements Agent and Client Security Denial-of-Service (DoS) Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-27358 \nPublished : July 26, 2024, 5:15 p.m. | 18\u00a0minutes ago \nDescription : An issue was discovered in WithSecure Elements Agent through 23.x for macOS and WithSecure Elements Client Security through 23.x for macOS. Local users can block an admin from completing an installation, aka a Denial-of-Service (DoS). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T19:42:39.000000Z"}, {"uuid": "3ca12dbf-c85e-4eff-9192-26483e270bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27357", "type": "seen", "source": "https://t.me/cvedetector/1704", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27357 - WithSecure local privilege escalation vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-27357 \nPublished : July 26, 2024, 5:15 p.m. | 18\u00a0minutes ago \nDescription : An issue was discovered in WithSecure Elements Agent through 23.x for macOS, WithSecure Elements Client Security through 23.x for macOS, and WithSecure MDR through 23.x for macOS. Local Privilege Escalation can occur during installations or updates by admins. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T19:42:33.000000Z"}, {"uuid": "0f645fc7-97ad-4567-bf62-af0c00c7669d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/209169", "content": "https://ift.tt/qJmgjZp\nCVE-2024-27351", "creation_timestamp": "2024-03-15T21:26:22.000000Z"}, {"uuid": "516deef8-bce6-4ab4-992e-7e147d82713a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/209156", "content": "https://ift.tt/qJmgjZp\nCVE-2024-27351", "creation_timestamp": "2024-03-15T21:22:09.000000Z"}, {"uuid": "b9f29b45-0a24-447f-83aa-7670af0e02d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27355", "type": "seen", "source": "https://t.me/ctinow/198159", "content": "https://ift.tt/YWBxTGk\nCVE-2024-27355", "creation_timestamp": "2024-03-02T00:22:15.000000Z"}, {"uuid": "0e044abe-79fb-49a4-a478-6b5d3df23480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27354", "type": "seen", "source": "https://t.me/ctinow/198158", "content": "https://ift.tt/Vl0KDnE\nCVE-2024-27354", "creation_timestamp": "2024-03-02T00:22:14.000000Z"}, {"uuid": "fcc7e003-03b6-4169-8867-13729cc9fe73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/199142", "content": "https://ift.tt/O59KsRi\nCVE-2024-27351", "creation_timestamp": "2024-03-04T10:41:04.000000Z"}, {"uuid": "5c3d1f19-843e-4f68-8279-d99431aa6b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27351", "type": "seen", "source": "https://t.me/ctinow/200048", "content": "https://ift.tt/Ca6L0Jb\nCVE-2024-27351 | Django up to 3.2.24/4.2.10/5.0.2 Regular Expression django.utils.text.Truncator.words redos", "creation_timestamp": "2024-03-05T09:42:27.000000Z"}, {"uuid": "8df710bf-1e01-4ef3-b51f-9862cdba509e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27355", "type": "seen", "source": "https://t.me/ctinow/198168", "content": "https://ift.tt/YWBxTGk\nCVE-2024-27355", "creation_timestamp": "2024-03-02T00:32:05.000000Z"}, {"uuid": "9f87a35e-3f07-4267-abed-c3aad16054ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27354", "type": "seen", "source": "https://t.me/ctinow/198167", "content": "https://ift.tt/Vl0KDnE\nCVE-2024-27354", "creation_timestamp": "2024-03-02T00:32:04.000000Z"}, {"uuid": "66dfc80a-815e-4e74-8ae8-6bc18e2b70fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27356", "type": "seen", "source": "https://t.me/ctinow/193929", "content": "https://ift.tt/EV0c9ir\nCVE-2024-27356", "creation_timestamp": "2024-02-27T02:26:37.000000Z"}, {"uuid": "27c688e4-60ce-4530-be93-d7e16f419d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27356", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10267", "content": "#exploit\n1. CVE-2024-27356:\nGL-iNet MT6000 - Arbitrary File Download\nhttps://packetstormsecurity.com/files/177886/GL-iNet-MT6000-4.5.5-Arbitrary-File-Download.html\n\n2. CVE-2024-23334:\nAiohttp LFI/Directory Traversal\nhttps://github.com/jhonnybonny/CVE-2024-23334", "creation_timestamp": "2024-04-04T03:34:54.000000Z"}, {"uuid": "49b081b2-ed7b-4408-93bf-a3434959197e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27356", "type": "seen", "source": "https://t.me/ctinow/193923", "content": "https://ift.tt/EV0c9ir\nCVE-2024-27356", "creation_timestamp": "2024-02-27T02:21:53.000000Z"}, {"uuid": "fe4a4036-ea14-4058-9dd1-ab039eed5a15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27350", "type": "seen", "source": "https://t.me/ctinow/193572", "content": "https://ift.tt/MJ8EHPN\nCVE-2024-27350", "creation_timestamp": "2024-02-26T17:47:16.000000Z"}, {"uuid": "a56654fd-bad4-4127-8fe7-af73802eb610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27356", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2809", "content": "#exploit\n1. CVE-2024-27356:\nGL-iNet MT6000 - Arbitrary File Download\nhttps://packetstormsecurity.com/files/177886/GL-iNet-MT6000-4.5.5-Arbitrary-File-Download.html\n\n2. CVE-2024-23334:\nAiohttp LFI/Directory Traversal\nhttps://github.com/jhonnybonny/CVE-2024-23334", "creation_timestamp": "2024-08-16T09:16:44.000000Z"}, {"uuid": "fb9b42f8-c712-4454-a3f1-94a3e43f9b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27354", "type": "seen", "source": "https://gist.github.com/alon710/232791296081f154e55f4a32d1309fc0", "content": "# CVE-2024-27354: CVE-2024-27354: Computational Denial of Service via Unbounded Primality Testing in phpseclib\n\n&gt; **CVSS Score:** 7.5\n&gt; **Published:** 2026-05-06\n&gt; **Full Report:** https://cvereports.com/reports/CVE-2024-27354\n\n## Summary\nA computational Denial of Service (DoS) vulnerability in phpseclib allows unauthenticated attackers to exhaust CPU resources by supplying malformed X.509 certificates. The vulnerability arises from missing bit-length upper bounds in the Miller-Rabin primality test implementation when evaluating explicit elliptic curve field parameters.\n\n## TL;DR\nphpseclib before versions 1.0.23, 2.0.47, and 3.0.36 suffers from a computational DoS flaw where parsing maliciously crafted X.509 certificates with massive explicit primes triggers an unbounded Miller-Rabin primality test, leading to CPU exhaustion.\n\n## Exploit Status: POC\n\n## Technical Details\n\n- **CWE ID**: CWE-400\n- **Attack Vector**: Network\n- **CVSS v3.1 Score**: 7.5 (High)\n- **EPSS Score**: 0.00204 (42.24%)\n- **Impact**: Denial of Service (CPU Exhaustion)\n- **Exploit Status**: Proof of Concept\n- **CISA KEV**: No\n\n## Affected Systems\n\n- phpseclib 1.x series\n- phpseclib 2.x series\n- phpseclib 3.x series\n- **phpseclib**: 1.x &lt; 1.0.23 (Fixed in: `1.0.23`)\n- **phpseclib**: 2.x &lt; 2.0.47 (Fixed in: `2.0.47`)\n- **phpseclib**: 3.x &lt; 3.0.36 (Fixed in: `3.0.36`)\n\n## Mitigation\n\n- Upgrade phpseclib to the latest patched version on the active release branch.\n- Implement application-level limits on the size of uploaded X.509 certificate files.\n- Configure standard PHP execution timeouts (`max_execution_time`) to bound resource consumption on worker threads.\n- Register a custom PHP error handler to convert E_USER_NOTICE into fatal exceptions if operating on the 1.x or 2.x branches.\n\n**Remediation Steps:**\n1. Identify the current version of phpseclib utilizing Composer (`composer show phpseclib/phpseclib`).\n2. Update the version constraint in `composer.json` to ensure a minimum version of 1.0.23, 2.0.47, or 3.0.36.\n3. Execute `composer update phpseclib/phpseclib` to retrieve the patched library.\n4. If utilizing the 1.x or 2.x branches, review application bootstrap code to ensure `set_error_handler` upgrades `E_USER_NOTICE` to a thrown exception.\n\n## References\n\n- [GitHub Advisory: GHSA-hg35-mp25-qf6h](https://github.com/advisories/GHSA-hg35-mp25-qf6h)\n- [katzj Gist - Technical Write-up](https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b)\n- [USENIX Security '25: X.509DoS Paper](https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-599-shi-bing.pdf)\n- [phpseclib 3.0 Fix Commit](https://github.com/phpseclib/phpseclib/commit/0358eb163c55a9fd7b3848b9ecc83f6b9e49dbf5)\n- [phpseclib 2.0 Fix Commit](https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575)\n- [phpseclib getLength Fix Commit](https://github.com/phpseclib/phpseclib/commit/c55b75199ec8d12cec6eadf6da99da4a3712fe56)\n\n\n---\n*Generated by [CVEReports](https://cvereports.com/reports/CVE-2024-27354) - Automated Vulnerability Intelligence*", "creation_timestamp": "2026-05-06T18:10:29.000000Z"}]}