{"vulnerability": "CVE-2024-2839", "sightings": [{"uuid": "4795fb7f-27ed-47bd-821b-ce5503eaf324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/113504683283325024", "content": "", "creation_timestamp": "2024-11-18T15:33:44.664385Z"}, {"uuid": "65ee3bc4-9130-4a8a-81e3-88e22c130247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "https://packetstormsecurity.com/files/182692/pyload_js2py_cve_2024_39205.rb.txt", "content": "", "creation_timestamp": "2024-11-18T14:11:17.000000Z"}, {"uuid": "10f5e9f9-a888-472d-ac61-d6539bd60d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "8c868f9a-a378-4b2d-b1d1-0693706550b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "b079bd0a-6b1d-4923-b9d4-52030d9868b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "3286cad7-0d73-4a7e-b0cb-4d172615640d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/wiHkUoym3ZVZHuyUJDrcBV3KdeCfU43bQ04Mu2Ihan1-GqY", "content": "", "creation_timestamp": "2025-09-06T19:00:09.000000Z"}, {"uuid": "dddc557e-7e31-4dd2-85ca-e73a6bb1cdd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pyload_js2py_cve_2024_39205.rb", "content": "", "creation_timestamp": "2024-11-15T14:30:41.000000Z"}, {"uuid": "7bb29b9e-946d-49aa-b07e-691551f99214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "seen", "source": "https://bsky.app/profile/0xdf.bsky.social/post/3mdq3itcjvb2h", "content": "", "creation_timestamp": "2026-01-31T15:01:34.870795Z"}, {"uuid": "d4262c87-649e-468b-95fd-9cb6a3bc789f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/g6X7ywwNEKxH0LAX8DMA5XfOPEPpINtht0LPK_PDykZ-Ru8", "content": "", "creation_timestamp": "2025-12-06T21:00:05.000000Z"}, {"uuid": "4f8c1726-d777-480b-8adf-1ea57c387a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/61943", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aOne command to fix CVE-2025-66478 (React 2 Shell RCE) in your Next.js / React RSC app.\nURL\uff1ahttps://github.com/L1337Xi/CVE-2024-28397-Exploit-Automation\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-12-06T16:53:15.000000Z"}, {"uuid": "f89ed946-f0da-4ba2-958e-ff5d3d70312a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/x99Zc-xFy4JDGaYtNahwXTvsg3jszuFgZhLwbvi5ABAkdHg", "content": "", "creation_timestamp": "2025-09-15T19:00:09.000000Z"}, {"uuid": "aa35ab81-0fca-4437-a6b2-9804beae87e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8112", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.\nURL\uff1ahttps://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-29T04:40:11.000000Z"}, {"uuid": "4f91fe28-e1cf-484a-9092-0d71bf38f8b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/or1-u7bo3hSkGx90FYNn1JWuirrC5XL-Ob12F2D6DSkjTA4", "content": "", "creation_timestamp": "2025-08-27T19:00:08.000000Z"}, {"uuid": "ba11f75e-7886-4603-9717-b7424fe1151c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/2crmPV6t2l8c_65RdqdX-lh17qE4pk8qzYJEEw3mTFfxh2M", "content": "", "creation_timestamp": "2025-10-12T03:00:06.000000Z"}, {"uuid": "a5e2ea89-bff8-4634-a912-e6874c838587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/yUPGb5HFNlxKeboVIteD2WL9fogmmZuy1mROuHeYRwSd5vQ", "content": "", "creation_timestamp": "2025-09-09T11:00:10.000000Z"}, {"uuid": "8b27cb87-1599-4839-83c0-4a6136c6f8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/jmBgELQXflf4YGPDuncPbvB38a24jMwprRSdSrgcCPVaJcM", "content": "", "creation_timestamp": "2025-09-17T09:00:05.000000Z"}, {"uuid": "188af2c0-1c4e-4607-a594-a87724413485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/snCsAi0mpXvm_MT8XIYXn1jz_LF987ZmM2qaHS-IMECKnkA", "content": "", "creation_timestamp": "2025-09-17T07:00:12.000000Z"}, {"uuid": "4fe1a1a3-43f0-486a-ab1b-e7bba02ebd8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/F59I-yMXEjjaBf_UW7JPjr9BzoJ257m3KZVctnGsYgmePcs", "content": "", "creation_timestamp": "2025-09-17T19:00:10.000000Z"}, {"uuid": "fea0d911-262e-487f-a311-ef1aff616b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/riay1JVH4IXsQL7Mnn8Nuf6k4RL65hv-fHuQQE9itkKg3LU", "content": "", "creation_timestamp": "2026-01-11T15:00:14.000000Z"}, {"uuid": "af3e8486-920e-4523-b0a1-e7f63b9ce210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/Fq5rQfcVa8DX2CfhcHSfmkE6tp17bvNWwxsqcDE1ZL0mUco", "content": "", "creation_timestamp": "2026-01-11T21:00:05.000000Z"}, {"uuid": "de8e8f50-500a-4024-a1aa-61cfe25a12e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28391", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11344", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28391\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL injection vulnerability in FME Modules quickproducttable module for PrestaShop v.1.2.1 and before, allows a remote attacker to escalate privileges and obtain information via the readCsv(), displayAjaxProductChangeAttr, displayAjaxProductAddToCart, getSearchProducts, and displayAjaxProductSku methods.\n\ud83d\udccf Published: 2024-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T20:32:56.016Z\n\ud83d\udd17 References:\n1. https://security.friendsofpresta.org/modules/2024/03/12/quickproducttable.html", "creation_timestamp": "2025-04-10T20:49:42.000000Z"}, {"uuid": "2bae10ea-eb68-4642-a85c-448b5eac85ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/oCUyi07vpXBIueN3_Nmyo2na4oCaxQ_u2NM4sY004Jd0Ywk", "content": "", "creation_timestamp": "2025-09-09T15:00:08.000000Z"}, {"uuid": "2334eb2e-033a-4fba-9585-3ea3053e42cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/IechzTJqEoGzyCNt3bqa1OsFAGBEn8a-qVqD1btrcdGoLD8", "content": "", "creation_timestamp": "2025-09-17T21:00:04.000000Z"}, {"uuid": "eaef6c7e-ecc4-4339-810d-446a1210bd33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/l5yGjY1hSiP3pTVFOwwMuZMDfoayAV8V9pI9TJkCuOyDVd0", "content": "", "creation_timestamp": "2025-08-17T09:00:04.000000Z"}, {"uuid": "47457c10-7149-4ec7-b160-db1a42743a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/MD0Mf_qmAQiAKMyol07KQgMIDH8_e-0YyKa4mUQ03gSZDIo", "content": "", "creation_timestamp": "2025-09-06T15:00:10.000000Z"}, {"uuid": "ce04c41f-aeb3-4a29-9beb-0ff434b116e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/WJkCmJihJ79zoaOa8mhqqjxZN20V6pb1GGYb_QJb0gQ-mT4", "content": "", "creation_timestamp": "2025-08-28T11:00:08.000000Z"}, {"uuid": "f7816a45-14b8-480a-b74e-5c36538dbb12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/zEgEMSJaZI91_3DmhAYjp7PuEgCBa4CsPI-NTGyCpRhV9kY", "content": "", "creation_timestamp": "2025-08-18T09:00:05.000000Z"}, {"uuid": "f6859d45-fb4c-411f-be06-2f21957749bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/8239", "content": "#exploit\n1. CVE-2024-28397:\njs2py sandbox escape, bypass pyimport restriction\nhttps://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape\n\n2. Bringing process injection into view(s): exploiting all macOS apps using nib files\nhttps://sector7.computest.nl/post/2024-04-bringing-process-injection-into-view-exploiting-all-macos-apps-using-nib-files\n\n3. CVE-2024-37079,\nCVE-2024-37080,\nCVE-2024-37081:\nVMware vCenter Server heap-overflow (RCE)\nhttps://gist.github.com/tothi/0ff034b254aca527c3a1283ff854592a", "creation_timestamp": "2024-06-21T02:31:47.000000Z"}, {"uuid": "4e9954ea-6f00-46a5-b4f2-bb6135b418d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/zgFBnkvVSxRTeAkLtgRFUn68oK3AG1ffjg88xq_I-KMhHIo", "content": "", "creation_timestamp": "2025-08-18T23:00:08.000000Z"}, {"uuid": "2fc69bb4-d315-4142-b0f2-a45db51abe92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/T0L2qoE3g7bZ7uebznwh8TeJ-spc6YzSi52rzunmaddsJ1rv", "content": "", "creation_timestamp": "2024-08-31T12:47:17.000000Z"}, {"uuid": "ceb565af-cd74-42c8-8c65-f8b026359b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/3355", "content": "\u200aCVE-2024-28397: js2py Vulnerability Exposes Millions of Python Users to RCE\n\nhttps://securityonline.info/cve-2024-28397-js2py-vulnerability-exposes-millions-of-python-users-to-rce/", "creation_timestamp": "2024-06-22T16:29:15.000000Z"}, {"uuid": "c90a4c1b-2627-44b8-bc60-5140e9dc8f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/7TmeLhBEwGZ4R6H7RLJZ_TUPR9TuN_dX3tdoe0qvNiQQVg", "content": "", "creation_timestamp": "2024-06-20T18:49:32.000000Z"}, {"uuid": "d7f465d5-bc55-4648-9e19-a571becfa265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "Telegram/b1wSB_lxrUDApHNS3eA5zc9gGgevYw2RH-srZO4phwQc_tk", "content": "", "creation_timestamp": "2024-07-05T15:14:04.000000Z"}, {"uuid": "2ff4bb7a-931f-4c8b-ac6f-c4b5673c6dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2126", "content": "CVE-2024-28397 js2py \nsandbox escape, bypass pyimport restriction\n*\nPOC + fix\n\n#python #js #poc", "creation_timestamp": "2024-06-19T19:08:33.000000Z"}, {"uuid": "94ce1e5f-9c6f-4286-aa67-2daed959c8dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/1036", "content": "#exploit\n1. CVE-2024-28397:\njs2py sandbox escape, bypass pyimport restriction\nhttps://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape\n\n2. Bringing process injection into view(s): exploiting all macOS apps using nib files\nhttps://sector7.computest.nl/post/2024-04-bringing-process-injection-into-view-exploiting-all-macos-apps-using-nib-files\n\n3. CVE-2024-37079,\nCVE-2024-37080,\nCVE-2024-37081:\nVMware vCenter Server heap-overflow (RCE)\nhttps://gist.github.com/tothi/0ff034b254aca527c3a1283ff854592a", "creation_timestamp": "2024-06-20T14:26:37.000000Z"}, {"uuid": "d4a9e89f-bc5d-4f9c-8e47-4c73a931669b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/1031", "content": "CVE-2024-28397 js2py \nsandbox escape, bypass pyimport restriction\n*\nPOC + fix\n\n#python #js #poc", "creation_timestamp": "2024-06-20T15:47:31.000000Z"}, {"uuid": "2c59b6c1-5ec9-416c-aea5-1c5f9caeaf4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28391", "type": "seen", "source": "https://t.me/ctinow/207473", "content": "https://ift.tt/5hjaLIX\nCVE-2024-28391", "creation_timestamp": "2024-03-14T05:27:01.000000Z"}, {"uuid": "bb8ccad1-2380-42b9-ad49-66d4c4dc7023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28390", "type": "seen", "source": "https://t.me/ctinow/207472", "content": "https://ift.tt/5HvxoLC\nCVE-2024-28390", "creation_timestamp": "2024-03-14T05:27:00.000000Z"}, {"uuid": "51134fee-be81-4aac-8aa0-b47219966d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28390", "type": "seen", "source": "https://t.me/ctinow/207464", "content": "https://ift.tt/5HvxoLC\nCVE-2024-28390", "creation_timestamp": "2024-03-14T05:21:48.000000Z"}, {"uuid": "a5f6992c-3f58-4008-bb7c-b7a4b662ff71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10710", "content": "#exploit\n1. CVE-2024-28397:\njs2py sandbox escape, bypass pyimport restriction\nhttps://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape\n\n2. Bringing process injection into view(s): exploiting all macOS apps using nib files\nhttps://sector7.computest.nl/post/2024-04-bringing-process-injection-into-view-exploiting-all-macos-apps-using-nib-files\n\n3. CVE-2024-37079,\nCVE-2024-37080,\nCVE-2024-37081:\nVMware vCenter Server heap-overflow (RCE)\nhttps://gist.github.com/tothi/0ff034b254aca527c3a1283ff854592a", "creation_timestamp": "2024-06-20T19:11:41.000000Z"}, {"uuid": "035cff12-d620-4f12-9b74-d96454ee95f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28391", "type": "seen", "source": "https://t.me/ctinow/207465", "content": "https://ift.tt/5hjaLIX\nCVE-2024-28391", "creation_timestamp": "2024-03-14T05:21:49.000000Z"}, {"uuid": "e6ca6e2d-2fd5-4226-a71d-87d59aa51473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28397", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2690", "content": "https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape\n\nCVE-2024-28397: js2py sandbox escaped, bypassing the PyImport restriction.\n#github #exploit", "creation_timestamp": "2024-06-20T11:31:03.000000Z"}]}