{"vulnerability": "CVE-2024-3853", "sightings": [{"uuid": "d6eb4f83-964b-488b-8971-308c26ca0f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38530", "type": "seen", "source": "https://t.me/cvedetector/2850", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38530 - Open eClass Unauthenticated Arbitrary File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-38530 \nPublished : Aug. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : The Open eClass platform (formerly known as GUnet eClass) is a complete Course Management System. An arbitrary file upload vulnerability in the \"save\" functionality of the H5P module enables unauthenticated users to upload arbitrary files on the server's filesystem. This may lead in unrestricted RCE on the backend server, since the upload location is accessible from the internet. This vulnerability is fixed in 3.16. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T18:27:18.000000Z"}, {"uuid": "81380734-ba25-4530-b494-57ce35bec563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38535", "type": "seen", "source": "https://t.me/cvedetector/658", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38535 - Suricata is a network Intrusion Detection System,\", \n  \"Content\": \"CVE ID : CVE-2024-38535 \nPublished : July 11, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Suricata can run out of memory when parsing crafted HTTP/2 traffic. Upgrade to 6.0.20 or 7.0.6. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T18:19:12.000000Z"}, {"uuid": "279aea14-c4b3-406e-b868-93f603a0b5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38536", "type": "seen", "source": "https://t.me/cvedetector/657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38536 - Suricata is a network Intrusion Detection System,\", \n  \"Content\": \"CVE ID : CVE-2024-38536 \nPublished : July 11, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. A memory allocation failure due to `http.memcap` being reached leads to a NULL-ptr reference leading to a crash. Upgrade to 7.0.6. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T18:19:11.000000Z"}, {"uuid": "7c11227a-f3c7-48b3-a2e0-40cbadcd35fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38534", "type": "seen", "source": "https://t.me/cvedetector/656", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38534 - Suricata is a network Intrusion Detection System,\", \n  \"Content\": \"CVE ID : CVE-2024-38534 \nPublished : July 11, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Crafted modbus traffic can lead to unlimited resource accumulation within a flow. Upgrade to 7.0.6. Set a limited stream.reassembly.depth to reduce the issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T18:19:10.000000Z"}]}