{"vulnerability": "CVE-2024-3976", "sightings": [{"uuid": "789133fe-2bed-49a2-89dd-d418dcae9315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39766", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478650427984617", "content": "", "creation_timestamp": "2024-11-14T01:13:10.675701Z"}, {"uuid": "970cf9b3-9210-40d9-ad42-5bd2003e7fc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39760", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkbthoc22t", "content": "", "creation_timestamp": "2025-01-14T15:17:36.876637Z"}, {"uuid": "a56f29d5-860d-4dfd-ad79-41be174fdc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39762", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkbzh4bc2t", "content": "", "creation_timestamp": "2025-01-14T15:17:43.136223Z"}, {"uuid": "1ab85ea9-1154-4b14-9ba8-16da5bb6fe90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39761", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkbwjihn2n", "content": "", "creation_timestamp": "2025-01-14T15:17:40.079056Z"}, {"uuid": "2b5f1bf9-50ca-40ab-acab-7120cf1f1322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39763", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkc4mq5z2n", "content": "", "creation_timestamp": "2025-01-14T15:17:46.470151Z"}, {"uuid": "ded8f1e7-9f55-49ba-a8b4-7b43149b1115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39764", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkca5ogb2n", "content": "", "creation_timestamp": "2025-01-14T15:17:50.151145Z"}, {"uuid": "c7b35ec4-9013-4222-bb48-81827e1ac1a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39765", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkcdg6x52r", "content": "", "creation_timestamp": "2025-01-14T15:17:53.565427Z"}, {"uuid": "2967e9ae-405e-4a66-9e3e-bde01b9e518a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39768", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkcgl3qt2f", "content": "", "creation_timestamp": "2025-01-14T15:17:57.262663Z"}, {"uuid": "16d23f7a-23c3-4eee-aa90-86d554c8ba1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39769", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkcjmj2v2j", "content": "", "creation_timestamp": "2025-01-14T15:18:00.265934Z"}, {"uuid": "edf9a5b8-aabf-41fd-8a67-8f02b7a8be4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39769", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827498566426965", "content": "", "creation_timestamp": "2025-01-14T15:49:55.492487Z"}, {"uuid": "12225e24-66b8-48aa-a3e8-339bed2c1d91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39764", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827498380941510", "content": "", "creation_timestamp": "2025-01-14T15:49:53.014379Z"}, {"uuid": "6423d3dd-c887-4355-8e4b-e2707c3ad26b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39765", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827498445021666", "content": "", "creation_timestamp": "2025-01-14T15:49:53.589484Z"}, {"uuid": "aac03b99-e753-43d0-8cd0-c181e98154fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39768", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827498492271582", "content": "", "creation_timestamp": "2025-01-14T15:49:55.624002Z"}, {"uuid": "f669cddf-490b-4765-aba9-9082ea2c8380", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3976", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113951209419549919", "content": "", "creation_timestamp": "2025-02-05T12:11:08.498781Z"}, {"uuid": "5bbf8513-bd9b-4f85-99ae-7eb77f4eaaa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3976", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhgkfemgnm2t", "content": "", "creation_timestamp": "2025-02-05T12:16:02.027332Z"}, {"uuid": "ff923205-cc98-4806-9276-34ad64b4a391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3976", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhgyruvrlo2g", "content": "", "creation_timestamp": "2025-02-05T16:33:33.312990Z"}, {"uuid": "ef269c5f-208a-4433-8f80-2db33c1c8ff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39761", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39761\n\ud83d\udd39 Description: Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_week_value` POST parameter.\n\ud83d\udccf Published: 2025-01-14T14:21:35.624Z\n\ud83d\udccf Modified: 2025-01-14T15:00:50.894Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2024-2018", "creation_timestamp": "2025-01-14T15:11:04.000000Z"}, {"uuid": "64677747-2336-401d-bb71-a79c5b44ed50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3976", "type": "seen", "source": "https://t.me/cvedetector/17293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3976 - GitLab Information Disclosure (Confidential Issue)\", \n  \"Content\": \"CVE ID : CVE-2024-3976 \nPublished : Feb. 5, 2025, 12:15 p.m. | 1\u00a0hour, 38\u00a0minutes ago \nDescription : An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose via the UI the confidential issues title and description from a public project to unauthorised instance users. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T14:58:19.000000Z"}, {"uuid": "e68e5352-7bbf-48bd-8bde-44c6b8c7b657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39767", "type": "seen", "source": "https://t.me/cvedetector/857", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39767 - Mattermost Mobile Apps Push Notification Spoofing\", \n  \"Content\": \"CVE ID : CVE-2024-39767 \nPublished : July 15, 2024, 9:15 a.m. | 32\u00a0minutes ago \nDescription : Mattermost Mobile Apps versions Severity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T11:49:48.000000Z"}, {"uuid": "fee78002-421d-400b-8778-0815263523f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3976", "type": "seen", "source": "Telegram/hLdM9fj0qGbL4-pmXo4w4aXTsnqDB4Ofev5GBvy6lFth1DeV", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "7b329526-8952-492b-ad41-73b3e816482d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39766", "type": "seen", "source": "https://t.me/cvedetector/10889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39766 - Intel Neural Compressor SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39766 \nPublished : Nov. 13, 2024, 9:15 p.m. | 41\u00a0minutes ago \nDescription : Improper neutralization of special elements used in SQL command in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 7.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:05:48.000000Z"}]}