{"vulnerability": "CVE-2024-37381", "sightings": [{"uuid": "5ed9a444-f72d-4710-a159-a19d3323a9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37381", "type": "seen", "source": "https://t.me/cvedetector/1814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37381 - Ivanti EPM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37381 \nPublished : July 29, 2024, 6:15 a.m. | 27\u00a0minutes ago \nDescription : An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2024 flat allows an authenticated attacker within the same network to execute arbitrary code. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T08:46:01.000000Z"}, {"uuid": "7b79cbe2-84d6-4202-9264-3ced3e2bbab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-37381", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1339", "content": "", "creation_timestamp": "2024-07-19T04:00:00.000000Z"}, {"uuid": "fd142c53-643e-4aee-b4f0-ab3f8534d0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37381", "type": "seen", "source": "https://t.me/HackingInsights/6482", "content": "\u200aIvanti Patches SQLi Vulnerability (CVE-2024-37381) in Endpoint Management Software\n\nhttps://securityonline.info/ivanti-patches-sqli-vulnerability-cve-2024-37381-in-endpoint-management-software/", "creation_timestamp": "2024-07-18T10:13:10.000000Z"}]}