{"vulnerability": "CVE-2024-36467", "sightings": [{"uuid": "bebf9840-9741-4bb8-884e-b13948ef5143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36467", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113553514538290733", "content": "", "creation_timestamp": "2024-11-27T06:32:06.866964Z"}, {"uuid": "e815c68e-0b31-4c64-b340-e19808f72f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36467", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11970", "content": "#Offensive_security\n#Red_Team_Tactics\nHack The Box (March):\n1. Alert: XSS to read internal pages and exploit directory traversal/file read vulnerability\n2. Certified: ESC9 attack on ADCS\n3. Chemistry: Directory Traversal, Root's Private SSH Key, and the AOIHTTP Vulnerability\n4. Unrested: Zabbix and CVE-2024-36467\n5. Instant: Using JWT token to access admin API", "creation_timestamp": "2025-03-26T12:55:07.000000Z"}, {"uuid": "06334b84-baec-4991-a145-d4cba81970c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-36467", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/d8544d24-ed2b-4062-9f3a-4c28c63647f3", "content": "", "creation_timestamp": "2024-12-04T05:44:04.024593Z"}]}