{"vulnerability": "CVE-2024-3933", "sightings": [{"uuid": "b004394a-5001-409c-93db-2a96fa371e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113869714895593544", "content": "", "creation_timestamp": "2025-01-22T02:46:01.234714Z"}, {"uuid": "53ab204b-5a48-4f23-87be-037c82724994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/siddharthharshraj/29a727b06da68abeed8abdfa8c343556", "content": "", "creation_timestamp": "2026-03-04T22:10:15.000000Z"}, {"uuid": "7955cd17-db63-4b18-a2ee-2bbd64d0673f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39339", "type": "seen", "source": "https://t.me/cvedetector/6018", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39339 - \"Suzuki &amp; Toyota Smartplay Headunits Information Disclosure Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-39339 \nPublished : Sept. 18, 2024, 8:15 p.m. | 45\u00a0minutes ago \nDescription : A vulnerability has been discovered in all versions of Smartplay headunits, which are widely used in Suzuki and Toyota cars. This misconfiguration can lead to information disclosure, leaking sensitive details such as diagnostic log traces, system logs, headunit passwords, and personally identifiable information (PII). The exposure of such information may have serious implications for user privacy and system integrity. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T23:26:42.000000Z"}, {"uuid": "b7d080a3-1733-48c2-b015-940a066c5683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39332", "type": "seen", "source": "https://t.me/cvedetector/9530", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39332 - Webswing Path Traversal Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-39332 \nPublished : Oct. 31, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T21:07:29.000000Z"}, {"uuid": "ca84e268-871e-42b3-9536-d2e21efafed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/alon710/1d19d243e6bf504868628ee2d5498eb0", "content": "", "creation_timestamp": "2026-01-24T21:24:31.000000Z"}, {"uuid": "8e7f0ed0-7218-4bc7-abcb-7924e2d08b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/alon710/59e228bfc63cd66f728f971d04c33fa8", "content": "", "creation_timestamp": "2026-01-24T22:31:46.000000Z"}, {"uuid": "89f5e8c3-aa54-4a47-83fe-1ce830cec22a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/alon710/6fa8b6f66f11e3daa155e6223eccc16b", "content": "", "creation_timestamp": "2026-01-24T22:31:43.000000Z"}, {"uuid": "6c99830a-83ac-4e34-b5ab-f00e66251441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/alon710/56337711395ddc5c91027f47c4438497", "content": "", "creation_timestamp": "2026-01-24T22:31:30.000000Z"}, {"uuid": "766890f8-019f-4cc5-9f71-41e2e98f5b75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39338", "type": "seen", "source": "https://gist.github.com/alon710/f6a6f6d9b31033de26e50a07b3cf5b90", "content": "", "creation_timestamp": "2026-01-24T22:31:28.000000Z"}, {"uuid": "e1c81f15-10c6-439f-a508-b9c22e0e8862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39330", "type": "seen", "source": "https://t.me/cvedetector/505", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39330 - An issue was discovered in Django 5.0 before 5.0.7\", \n  \"Content\": \"CVE ID : CVE-2024-39330 \nPublished : July 10, 2024, 5:15 a.m. | 16\u00a0minutes ago \nDescription : An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T07:33:42.000000Z"}]}