{"vulnerability": "CVE-2024-3115", "sightings": [{"uuid": "55425ac8-1e87-4997-a3d1-24b198807c2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31158", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478059968845695", "content": "", "creation_timestamp": "2024-11-13T22:43:00.863838Z"}, {"uuid": "e2d5f97f-0070-41c4-a6dd-c5b903d41767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31154", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478059954537437", "content": "", "creation_timestamp": "2024-11-13T22:43:00.909458Z"}, {"uuid": "f3bb3d6f-df63-46d6-beaa-9253aaaefcf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31156", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952669633961882", "content": "", "creation_timestamp": "2025-02-05T18:22:29.685211Z"}, {"uuid": "a697baf7-a806-4a4e-9859-b3158aab983e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31153", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7aifhzs2a", "content": "", "creation_timestamp": "2025-02-12T22:17:01.213864Z"}, {"uuid": "71c4a81b-d90a-438d-9aee-0945695dcbe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31155", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7akvqdu2p", "content": "", "creation_timestamp": "2025-02-12T22:17:03.781140Z"}, {"uuid": "58121eda-f8b5-4db9-9191-61074064e31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31157", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7andfp42p", "content": "", "creation_timestamp": "2025-02-12T22:17:06.344185Z"}, {"uuid": "398e0a89-a325-4c15-9ec0-8b44c300b253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31153", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993330922871381", "content": "", "creation_timestamp": "2025-02-12T22:43:11.578822Z"}, {"uuid": "74f491fd-f3eb-4005-9a7c-656672ac0d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31155", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993330936305755", "content": "", "creation_timestamp": "2025-02-12T22:43:11.793002Z"}, {"uuid": "dbbf91a9-4d99-4c38-ac09-82884df29108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31157", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993389933934695", "content": "", "creation_timestamp": "2025-02-12T22:58:11.996963Z"}, {"uuid": "69d0ff36-7075-4c0b-ba5a-47ffb0af11ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31152", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:28.000000Z"}, {"uuid": "a0a60726-2c8b-4082-abd6-b600f4f417dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31150", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16251", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31150\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Out-of-bounds read for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2025-05-13T21:03:01.090Z\n\ud83d\udccf Modified: 2025-05-13T21:03:01.090Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01253.html", "creation_timestamp": "2025-05-13T21:31:15.000000Z"}, {"uuid": "424f1fcb-6833-4ae1-b050-108c54c87aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31155", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "32d2a940-4158-4582-8959-6a259a669d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31157", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "530e96cc-4bda-4afa-936a-52df07887420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31152", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:56.000000Z"}, {"uuid": "fdd05404-f121-4c33-a208-8eaf102d3024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31156", "type": "seen", "source": "https://t.me/cvedetector/17324", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24320 - BIG-IP Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24320 \nPublished : Feb. 5, 2025, 6:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. This vulnerability is due to an incomplete fix for  CVE-2024-31156  .\u00a0  \n  \nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T21:39:55.000000Z"}, {"uuid": "61502860-3bdc-41c5-aaf7-157a2252581b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31151", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/9432", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31151 - LevelOne WBR-6012 Hard-Coded Credentials Stored-XSS Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-31151 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6:  \n  \n    803cdd0f 41 72 69 65        ds         \"AriesSerenaCairryNativitaMegan\"  \n             73 53 65 72   \n             65 6e 61 43  \n             ...  \n  \nIt is referenced by the function at 0x800b78b0 and simplified in the pseudocode below:  \n  \n    if (is_equal = strcmp(password,\"AriesSerenaCairryNativitaMegan\"){  \n        ret = 3;}  \n  \nWhere 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor).  \n  \nWhile there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater \"Pu\" (new user password) in place of \"Pa\" (new admin password). \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:52:06.000000Z"}, {"uuid": "3a2944d7-1800-48eb-b546-d2dbaab64200", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31152", "type": "seen", "source": "https://t.me/cvedetector/9433", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31152 - LevelOne WBR-6012 Router HTTP Request Reboot Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31152 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router with firmware R0.40e6 is vulnerable to improper resource allocation within its web application, where a series of crafted HTTP requests can cause a reboot. This could lead to network service interruptions. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:52:06.000000Z"}]}