{"vulnerability": "CVE-2024-3727", "sightings": [{"uuid": "69452558-b5ff-4009-b6f0-c3965a8c6956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37272", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2or2o7y25", "content": "", "creation_timestamp": "2025-01-02T12:18:38.629310Z"}, {"uuid": "a394f59b-25c0-46a1-be60-dfbe261608c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37274", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2oth57e2m", "content": "", "creation_timestamp": "2025-01-02T12:18:41.085412Z"}, {"uuid": "804d8f7b-0d13-4109-baf2-6ca0aaa8f23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37272", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759741481137628", "content": "", "creation_timestamp": "2025-01-02T16:38:19.690920Z"}, {"uuid": "8a22dfa7-ff47-4c08-bc48-32559629046b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37274", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759741495519188", "content": "", "creation_timestamp": "2025-01-02T16:38:19.766755Z"}, {"uuid": "34829693-21f8-4d27-a327-c56df94de4e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3727", "type": "seen", "source": "https://bsky.app/profile/nike49424.bsky.social/post/3meeq66km4k2q", "content": "", "creation_timestamp": "2026-02-08T20:04:41.305701Z"}, {"uuid": "d09a6029-dcbf-44ad-9618-d62ed9545c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1393", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3727\n\ud83d\udd39 Description: A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.\n\ud83d\udccf Published: 2024-05-09T14:57:21.327Z\n\ud83d\udccf Modified: 2025-01-13T20:48:50.544Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:0045\n2. https://access.redhat.com/errata/RHSA-2024:3718\n3. https://access.redhat.com/errata/RHSA-2024:4159\n4. https://access.redhat.com/errata/RHSA-2024:4613\n5. https://access.redhat.com/errata/RHSA-2024:4850\n6. https://access.redhat.com/errata/RHSA-2024:4960\n7. https://access.redhat.com/errata/RHSA-2024:5258\n8. https://access.redhat.com/errata/RHSA-2024:5951\n9. https://access.redhat.com/errata/RHSA-2024:6054\n10. https://access.redhat.com/errata/RHSA-2024:6708\n11. https://access.redhat.com/errata/RHSA-2024:6824\n12. https://access.redhat.com/errata/RHSA-2024:7164\n13. https://access.redhat.com/errata/RHSA-2024:7174\n14. https://access.redhat.com/errata/RHSA-2024:7182\n15. https://access.redhat.com/errata/RHSA-2024:7187\n16. https://access.redhat.com/errata/RHSA-2024:7922\n17. https://access.redhat.com/errata/RHSA-2024:7941\n18. https://access.redhat.com/errata/RHSA-2024:8260\n19. https://access.redhat.com/errata/RHSA-2024:8425\n20. https://access.redhat.com/errata/RHSA-2024:9097\n21. https://access.redhat.com/errata/RHSA-2024:9098\n22. https://access.redhat.com/errata/RHSA-2024:9102\n23. https://access.redhat.com/errata/RHSA-2024:9960\n24. https://access.redhat.com/security/cve/CVE-2024-3727\n25. https://bugzilla.redhat.com/show_bug.cgi?id=2274767", "creation_timestamp": "2025-01-13T21:12:01.000000Z"}, {"uuid": "fc7a6143-76c6-4994-beea-c66cd38c23d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37271", "type": "seen", "source": "https://t.me/cvedetector/1404", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37271 - Michael Nelson Print My Blog Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-37271 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Nelson Print My Blog allows Stored XSS.This issue affects Print My Blog: from n/a through 3.27.0. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:48.000000Z"}, {"uuid": "6fd78f6b-e459-4644-a6d9-3d64b64e976c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37275", "type": "seen", "source": "https://t.me/cvedetector/1400", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37275 - NextScripts Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37275 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NextScripts allows Reflected XSS.This issue affects NextScripts: from n/a through 4.4.6. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:41.000000Z"}, {"uuid": "4a812e60-85cd-4e9f-b842-3beaa9fbd6f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37278", "type": "seen", "source": "https://t.me/cvedetector/1399", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37278 - Pratik Chaskar Cards for Beaver Builder Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37278 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pratik Chaskar Cards for Beaver Builder.This issue affects Cards for Beaver Builder: from n/a through 1.1.4. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:40.000000Z"}, {"uuid": "8d3cfd05-72fe-4909-8204-4c72743432ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5260", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3727\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.\n\ud83d\udccf Published: 2024-05-09T14:57:21.327Z\n\ud83d\udccf Modified: 2025-02-25T08:07:16.415Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:0045\n2. https://access.redhat.com/errata/RHSA-2024:3718\n3. https://access.redhat.com/errata/RHSA-2024:4159\n4. https://access.redhat.com/errata/RHSA-2024:4613\n5. https://access.redhat.com/errata/RHSA-2024:4850\n6. https://access.redhat.com/errata/RHSA-2024:4960\n7. https://access.redhat.com/errata/RHSA-2024:5258\n8. https://access.redhat.com/errata/RHSA-2024:5951\n9. https://access.redhat.com/errata/RHSA-2024:6054\n10. https://access.redhat.com/errata/RHSA-2024:6122\n11. https://access.redhat.com/errata/RHSA-2024:6708\n12. https://access.redhat.com/errata/RHSA-2024:6818\n13. https://access.redhat.com/errata/RHSA-2024:6824\n14. https://access.redhat.com/errata/RHSA-2024:7164\n15. https://access.redhat.com/errata/RHSA-2024:7174\n16. https://access.redhat.com/errata/RHSA-2024:7182\n17. https://access.redhat.com/errata/RHSA-2024:7187\n18. https://access.redhat.com/errata/RHSA-2024:7922\n19. https://access.redhat.com/errata/RHSA-2024:7941\n20. https://access.redhat.com/errata/RHSA-2024:8260\n21. https://access.redhat.com/errata/RHSA-2024:8425\n22. https://access.redhat.com/errata/RHSA-2024:9097\n23. https://access.redhat.com/errata/RHSA-2024:9098\n24. https://access.redhat.com/errata/RHSA-2024:9102\n25. https://access.redhat.com/errata/RHSA-2024:9960\n26. https://access.redhat.com/security/cve/CVE-2024-3727\n27. https://bugzilla.redhat.com/show_bug.cgi?id=2274767", "creation_timestamp": "2025-02-25T08:25:24.000000Z"}, {"uuid": "e152a2c5-f485-4d40-b5cc-e4531287e0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37270", "type": "seen", "source": "https://t.me/cvedetector/565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37270 - Insertion of Sensitive Information into Log File v\", \n  \"Content\": \"CVE ID : CVE-2024-37270 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Insertion of Sensitive Information into Log File vulnerability in TrustedLogin TrustedLogin Vendor.This issue affects TrustedLogin Vendor: from n/a before 1.1.1. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:47.000000Z"}]}