{"vulnerability": "CVE-2024-3197", "sightings": [{"uuid": "7eea93a4-4a77-4914-b0c9-632172018cc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31976", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113555901407037805", "content": "", "creation_timestamp": "2024-11-27T16:39:06.937939Z"}, {"uuid": "15c8df53-1781-41c6-bb4b-cbecb8f8b40f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31975", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:56.000000Z"}, {"uuid": "faa1d2ee-1bbf-42aa-9ea2-ee88a161d0f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31975", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:27.000000Z"}, {"uuid": "9396fbcd-3776-4820-826c-d745327ef413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31973", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:27.000000Z"}, {"uuid": "fb5f7630-3fc3-4f24-a752-f0b2f353d297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31973", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:56.000000Z"}, {"uuid": "95da40bb-b442-4e24-9527-1c06e7843da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31972", "type": "seen", "source": "https://t.me/cvedetector/9454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31972 - EnGenius ESR580 Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-31972 \nPublished : Oct. 30, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T20:03:08.000000Z"}, {"uuid": "5bbfc0db-829f-414f-9fe0-70d178aaf44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7324", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-31974\nURL\uff1ahttps://github.com/absholi7ly/WordPress-XStore-theme-SQL-Injection\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-17T04:20:11.000000Z"}, {"uuid": "1a7b673a-7425-42b4-a1c9-c6e8aa890b3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "seen", "source": "https://t.me/GithubRedTeam/7323", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-31974\nURL\uff1ahttps://github.com/actuator/com.solarized.firedown\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-17T02:17:45.000000Z"}, {"uuid": "87a34826-93cc-464b-a70d-7dea75adbf4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31973", "type": "seen", "source": "https://t.me/cvedetector/9452", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31973 - Hitron CODA-4582 Wi-Fi Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31973 \nPublished : Oct. 30, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T20:03:06.000000Z"}, {"uuid": "ac997c87-9606-4581-987d-575e639d1805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31975", "type": "seen", "source": "https://t.me/cvedetector/9453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31975 - EnGenius ESR580 Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31975 \nPublished : Oct. 30, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : EnGenius ESR580 devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T20:03:07.000000Z"}, {"uuid": "4165fbc7-e35d-4f23-a479-00764b9c2787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31977", "type": "seen", "source": "https://t.me/cvedetector/1568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31977 - Adtran SmartOS OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-31977 \nPublished : July 24, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : Adtran 834-5 11.1.0.101-202106231430, and fixed as of SmartOS Version 12.5.5.1, devices allow OS Command Injection via shell metacharacters to the Ping or Traceroute utility. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T18:19:14.000000Z"}, {"uuid": "425d2ce1-9b23-46cd-9ce1-e4462235a72d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31971", "type": "seen", "source": "https://t.me/cvedetector/1567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31971 - AdTran NetVanta 3120 Stored XSS Vulnerabilities\", \n  \"Content\": \"CVE ID : CVE-2024-31971 \nPublished : July 24, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : Multiple stored cross-site scripting (XSS) vulnerabilities on AdTran NetVanta 3120 18.01.01.00.E devices allow remote attackers to inject arbitrary JavaScript, as demonstrated by /mainPassword.html, /processIdentity.html, /public.html, /dhcp.html, /private.html, /hostname.html, /connectivity.html, /NetworkMonitor.html, /trafficMonitoringConfig.html, and /wizardMain.html. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T18:19:13.000000Z"}, {"uuid": "4b97e532-3527-426a-ae4d-a428c8b8309b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31970", "type": "seen", "source": "https://t.me/cvedetector/1576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31970 - AdTran SRG 834-5 SSH Default Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31970 \nPublished : July 24, 2024, 4:15 p.m. | 35\u00a0minutes ago \nDescription : AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1 and fixed in Version 12.1.3.1) have SSH enabled by default, accessible both over the LAN and the Internet. During a window of time when the device is being set up, it uses a default username and password combination of admin/admin with root-level privileges. An attacker can exploit this window to gain unauthorized root access by either modifying the existing admin account or creating a new account with equivalent privileges. This vulnerability allows attackers to execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T19:09:35.000000Z"}, {"uuid": "5ada8c0c-9850-465a-b20c-148fcc97899f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31979", "type": "seen", "source": "https://t.me/cvedetector/1073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31979 - Apache StreamPipes SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-31979 \nPublished : July 17, 2024, 9:15 a.m. | 42\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installation process of pipeline elements.  \nPreviously, StreamPipes allowed users to configure custom endpoints from which to install additional pipeline elements.   \nThese endpoints were not properly validated, allowing an attacker to get StreamPipes to send an HTTP GET request to an arbitrary address.  \nThis issue affects Apache StreamPipes: through 0.93.0.  \n  \nUsers are recommended to upgrade to version 0.95.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T12:22:05.000000Z"}, {"uuid": "7592b5ef-5807-4f1e-9ddd-3770e3cbcdc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GhostPrincess/21986", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T07:04:20.000000Z"}, {"uuid": "ba0a652a-9218-4c06-8d6f-8016c8d0b523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/175", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:12:01.000000Z"}, {"uuid": "17d10e2a-a5c4-4966-b71e-836fdda04682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GhostPrincess/14707", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T07:04:20.000000Z"}, {"uuid": "a3aa6cf5-578b-4f37-9049-e365f80cef74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7959", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T06:58:10.000000Z"}, {"uuid": "879fdc03-5ab0-4b93-a04c-5881663eb815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3281", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T07:04:38.000000Z"}, {"uuid": "41ad9b76-452d-4823-b998-fcce46a496c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2235", "content": "Android Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974", "creation_timestamp": "2024-06-24T15:29:02.000000Z"}, {"uuid": "ed645379-b805-4cc2-a6d4-90e2629092d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6728", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T06:58:10.000000Z"}, {"uuid": "21cf33cb-6bc9-4fcd-8aac-9626040eec68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31974", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25050", "content": "Tools - Hackers Factory\n\nCollection of OPSEC Tradecraft and TTPs for Red Team Operations\n\nhttps://github.com/WesleyWong420/OPSEC-Tradecraft\n\nAndroid Firedown Browser app allows a remote attacker to execute arbitrary JavaScript code via an implicit intent (CVE-2024-31974)\n\nhttps://github.com/actuator/com.solarized.firedown/blob/main/CVE-2024-31974\n\nPS4 PPPwn Exploit: Using Android DroidPPPwn app it is possible to jailbreak PS4\n\nInfo: https://wololo.net/2024/05/28/ps4-pppwn-exploit-droidpppwn-port-to-android-phones-version-1-1/\n\nDroidPPPwn: https://github.com/deviato/DroidPPPwn\n\nNew dalvik bytecode disassembler and graph view\n\nBlog: https://margin.re/2024/05/dalvik-disassembly/\n\nGithub: https://github.com/MarginResearch/dalvik\n\n\u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nALL IN ONE Hacking Tool For Hackers\n\nhttps://github.com/Z4nzu/hackingtool\n\nIncident Response Projects for Beginners\n\nHands-on projects designed to enhance your\u00a0 cybersecurity skills:\n\n- Phishing Attack Investigation\n- Malware Analysis and Containment\n- Network Intrusion Detection and Response\n- DDoS Attack Detection and Response\n\nhttps://github.com/0xrajneesh/Incident-Response-Projects-for-Beginners\n\nNetwork Pentesting Mindmap \n\n- Traffic Hijacking\n- MiTM Attacks\n- Dynamic IGP Routing\n- Configuration Exfiltration\n- DoS\n- NAC/802.1X Bypassing\n- GRE Pivoting\n- Cisco EEM for hiding user\n- Authentication Cracking\n- Information Gathering\n- Cisco Passwords\n- VLAN Bypassing\n\nhttps://github.com/casterbyte/NetworkNightmare/tree/main\n\n#HackersFactory", "creation_timestamp": "2024-06-14T06:58:25.000000Z"}]}