{"vulnerability": "CVE-2024-3604", "sightings": [{"uuid": "525335ed-ab7b-442b-82a9-34274d8a037f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36042", "type": "seen", "source": "https://bsky.app/profile/decrypt.lol/post/3lg4chhx2kl2n", "content": "", "creation_timestamp": "2025-01-19T17:02:13.917340Z"}, {"uuid": "31dd294f-caa3-4f7a-a4a9-67a9bf6a974f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7ccuzzl72w", "content": "", "creation_timestamp": "2025-02-28T01:53:18.830505Z"}, {"uuid": "d533a807-e6c3-4cfd-b3af-4835d093bc6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114082772419421153", "content": "", "creation_timestamp": "2025-02-28T17:49:20.825811Z"}, {"uuid": "42f11e8c-1ea1-4ad0-a3e6-7e83ed720d5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114082772467366713", "content": "", "creation_timestamp": "2025-02-28T17:49:21.659258Z"}, {"uuid": "b92b4462-85fb-43bb-bce5-131de018cd71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36042", "type": "seen", "source": "https://gist.github.com/wulfgarpro/a625586ce55cc602e21ed69b6e29e4d4", "content": "", "creation_timestamp": "2025-03-12T03:30:38.000000Z"}, {"uuid": "d4081d3e-012b-41f0-91ce-f37b031a535b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "https://t.me/cvedetector/19097", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36046 - Infoblox NIOS Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-36046 \nPublished : Feb. 27, 2025, 11:15 p.m. | 31\u00a0minutes ago \nDescription : Infoblox NIOS through 8.6.4 executes with more privileges than required. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T01:08:09.000000Z"}, {"uuid": "f41aeb25-6fcb-461a-91dd-d6d8262c864f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7ccugnus2y", "content": "", "creation_timestamp": "2025-02-28T01:53:15.844753Z"}, {"uuid": "3bfea155-fd19-469d-9413-96fbb5087892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "Telegram/lxPFG824KlKFZMtxjFCq0gu3xdkFb7q1YpTz7y4KWLSh5ylR", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}, {"uuid": "f035fb81-05a7-461e-be56-50c77feaee91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078577366616418", "content": "", "creation_timestamp": "2025-02-28T00:02:29.268142Z"}, {"uuid": "943fef0f-778e-445c-b2f8-27680b17eee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078577366616418", "content": "", "creation_timestamp": "2025-02-28T00:02:29.333211Z"}, {"uuid": "381a15c3-9f67-4a07-b550-cd400dd54e7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36042", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwze4wgm7q2u", "content": "", "creation_timestamp": "2025-08-22T21:02:37.859236Z"}, {"uuid": "ac66dd97-4e01-4157-912e-ef96c2ca0e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "Telegram/FOMrGUrlRoMyhVperFO1joj8dr6qcmmuGqWnOqTpCfq78R2s", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}, {"uuid": "aec664c0-fb70-40d1-9695-4d1e9f326366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "https://t.me/cvedetector/19093", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36047 - \"Infoblox NIOS Input Validation Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-36047 \nPublished : Feb. 27, 2025, 11:15 p.m. | 31\u00a0minutes ago \nDescription : Infoblox NIOS through 8.6.4 and 9.x through 9.0.3 has Improper Input Validation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T01:08:07.000000Z"}, {"uuid": "119d2517-8351-4105-9e89-dfcbae7a6cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5821", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36046\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Infoblox NIOS through 8.6.4 executes with more privileges than required.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T22:52:43.514Z\n\ud83d\udd17 References:\n1. https://support.infoblox.com/s/article/000010390", "creation_timestamp": "2025-02-27T23:25:45.000000Z"}, {"uuid": "cc02fcbf-0dca-453e-9197-446d72efaa74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5820", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36047\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Infoblox NIOS through 8.6.4 and 9.x through 9.0.3 has Improper Input Validation.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T22:53:57.808Z\n\ud83d\udd17 References:\n1. https://support.infoblox.com/s/article/000010391", "creation_timestamp": "2025-02-27T23:25:43.000000Z"}, {"uuid": "1bb19604-14bb-4285-8aa0-5fba489d583c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36046", "type": "seen", "source": "Telegram/ZaxBreXJlGkVar0c4t3HEGcVLJI1ehXWkUKVcFGsG1Yt1kME", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}, {"uuid": "484c07e9-2de2-46b9-a57f-5e3487a94ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36042", "type": "published-proof-of-concept", "source": "Telegram/LwSDijFqnk4tR8BjnaJf1WvRXs3ofWXlIwghYDxed4ow3AM", "content": "", "creation_timestamp": "2025-08-20T09:00:04.000000Z"}, {"uuid": "32cdd461-604a-46ff-afc8-f9cb5e54b031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36047", "type": "seen", "source": "Telegram/zwsLvtmhfN36j2SvXoWRYc7BTMBOvmG_cFHhUMfQ6zHm1WY8", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}, {"uuid": "59f8fbba-fda8-4b0e-abcb-919e4fd18ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36041", "type": "seen", "source": "https://t.me/HackingInsights/5134", "content": "\u200aCVE-2024-36041: KDE Plasma Flaw Opens Door to Unauthorized System Access\n\nhttps://securityonline.info/cve-2024-36041-kde-plasma-flaw-opens-door-to-unauthorized-system-access/", "creation_timestamp": "2024-07-07T10:31:32.000000Z"}, {"uuid": "1224778e-ab54-4ec5-a308-398960ff89d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3604", "type": "seen", "source": "https://t.me/cvedetector/295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3604 - The OSM \u2013 OpenStreetMap plugin for WordPress is vu\", \n  \"Content\": \"CVE ID : CVE-2024-3604 \nPublished : July 9, 2024, 9:15 a.m. | 31\u00a0minutes ago \nDescription : The OSM \u2013 OpenStreetMap plugin for WordPress is vulnerable to SQL Injection via the 'tagged_filter' attribute of the 'osm_map_v3' shortcode in all versions up to, and including, 6.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T11:50:11.000000Z"}, {"uuid": "8534b824-65fa-4e3b-89ab-44c46e25effa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36041", "type": "seen", "source": "https://t.me/cvedetector/75", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36041 - KSmserver in KDE Plasma Workspace (aka plasma-work\", \n  \"Content\": \"CVE ID : CVE-2024-36041 \nPublished : July 5, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : KSmserver in KDE Plasma Workspace (aka plasma-workspace) before 5.27.11.1 and 6.x before 6.0.5.1 allows connections via ICE based purely on the host, i.e., all local connections are accepted. This allows another user on the same machine to gain access to the session manager, e.g., use the session-restore feature to execute arbitrary code as the victim (on the next boot) via earlier use of the /tmp directory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T04:58:23.000000Z"}]}