{"vulnerability": "CVE-2024-3186", "sightings": [{"uuid": "34aabab4-f6bf-4538-802c-ef993973d3df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31862", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4324", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31862\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Zeppelin when creating a new note from Zeppelin's UI. This issue affects Apache Zeppelin from 0.10.1 before 0.11.0.\n\nUsers are recommended to upgrade to version 0.11.0, which fixes the issue.\n\ud83d\udccf Published: 2024-04-09T12:30:47Z\n\ud83d\udccf Modified: 2025-02-13T19:01:48Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-31862\n2. https://github.com/apache/zeppelin/pull/4632\n3. https://github.com/apache/zeppelin/commit/f025a697c1d1d0264064d5adf6cb0b20d85041b6\n4. https://github.com/apache/zeppelin\n5. https://lists.apache.org/thread/73xdjx43yg4yz8bd4p3o8vzyybkysmn0\n6. http://www.openwall.com/lists/oss-security/2024/04/09/5", "creation_timestamp": "2025-02-13T19:18:57.000000Z"}, {"uuid": "432b36c9-78e6-41f5-8c77-158742876f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15101", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31860\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Zeppelin.\n\nBy adding relative path indicators(E.g ..), attackers can see the contents for any files in the filesystem that the server account can access.\u00a0\nThis issue affects Apache Zeppelin: from 0.9.0 before 0.11.0.\n\nUsers are recommended to upgrade to version 0.11.0, which fixes the issue.\n\ud83d\udccf Published: 2024-04-09T09:08:28.802Z\n\ud83d\udccf Modified: 2025-05-06T13:12:31.467Z\n\ud83d\udd17 References:\n1. https://github.com/apache/zeppelin/pull/4632\n2. https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x", "creation_timestamp": "2025-05-06T13:20:50.000000Z"}, {"uuid": "f7afb754-633b-449b-a562-d7cee75de740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31864", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lviiseg7vlq2", "content": "", "creation_timestamp": "2025-08-03T10:45:41.867287Z"}, {"uuid": "044ffd30-8449-4b7d-a851-05b4b99ad914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31864", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lvittswm732d", "content": "", "creation_timestamp": "2025-08-03T14:03:12.143153Z"}, {"uuid": "26e514d1-46ea-4660-8642-01725c3e210f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31864", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/72", "content": "", "creation_timestamp": "2025-08-03T15:52:05.000000Z"}, {"uuid": "500cdc18-132f-41c8-8fb6-59bb28615794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4321", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31860\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Zeppelin.\n\nBy adding relative path indicators (e.g `..`), attackers can see the contents for any files in the filesystem that the server account can access.\u00a0\nThis issue affects Apache Zeppelin from 0.9.0 before 0.11.0.\n\nUsers are recommended to upgrade to version 0.11.0, which fixes the issue.\n\ud83d\udccf Published: 2024-04-09T09:31:12Z\n\ud83d\udccf Modified: 2025-02-13T19:01:59Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-31860\n2. https://github.com/apache/zeppelin/pull/4632\n3. https://github.com/apache/zeppelin/commit/f025a697c1d1d0264064d5adf6cb0b20d85041b6\n4. https://github.com/apache/zeppelin\n5. https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x\n6. http://www.openwall.com/lists/oss-security/2024/04/09/2", "creation_timestamp": "2025-02-13T19:18:45.000000Z"}, {"uuid": "c34b0490-f8a4-4fea-9654-5740f27d9ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31869", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/3623", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-20T13:07:57.000000Z"}, {"uuid": "4ce905c4-1cee-40c6-888a-370fe7e2961f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31869", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10357", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-19T16:41:11.000000Z"}, {"uuid": "67218af2-bf9c-4395-a4dd-198a84309bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3186", "type": "seen", "source": "https://t.me/cvedetector/8151", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3186 - GoAhead Web Server GoAhead Web Server DoS NULL Pointer Dereference\", \n  \"Content\": \"CVE ID : CVE-2024-3186 \nPublished : Oct. 17, 2024, 8:15 a.m. | 30\u00a0minutes ago \nDescription : CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version &lt;=\nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T10:47:14.000000Z"}, {"uuid": "debf4471-766b-47ce-9ab9-1d38b2967161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31864", "type": "seen", "source": "https://t.me/arpsyndicate/4610", "content": "#ExploitObserverAlert\n\nCVE-2024-31864\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-31864. Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.  The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1.  Users are recommended to upgrade to version 0.11.1, which fixes the issue.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.5747126", "creation_timestamp": "2024-04-13T00:29:02.000000Z"}]}