{"vulnerability": "CVE-2024-3983", "sightings": [{"uuid": "aa7ee514-a806-40bc-a9d8-53330a638c9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39831", "type": "seen", "source": "https://t.me/cvedetector/7308", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39831 - Apache OpenHarmony Use-After-Free Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-39831 \nPublished : Oct. 8, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T07:01:06.000000Z"}, {"uuid": "8c318116-5223-4449-bdcb-2b7c545395e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39836", "type": "seen", "source": "https://t.me/cvedetector/3903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39836 - Mattermost Account Enumeration and Session Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39836 \nPublished : Aug. 22, 2024, 7:15 a.m. | 41\u00a0minutes ago \nDescription : Mattermost versions 9.9.x Severity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T10:10:57.000000Z"}, {"uuid": "a600593a-49fe-4999-893c-c1121ebb20bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39838", "type": "seen", "source": "https://t.me/cvedetector/2431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39838 - ZWX-2000CSW2-HN Default Credentials Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-39838 \nPublished : Aug. 5, 2024, 5:15 a.m. | 45\u00a0minutes ago \nDescription : ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15 uses hard-coded credentials, which may allow a network-adjacent attacker with an administrative privilege to alter the configuration of the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T08:03:09.000000Z"}, {"uuid": "618819f5-78dd-42a8-95ea-743011effebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39839", "type": "seen", "source": "https://t.me/cvedetector/2240", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39839 - Mattermost Remote Username Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39839 \nPublished : Aug. 1, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Mattermost versions 9.9.x Severity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:55:55.000000Z"}, {"uuid": "0229b32e-7550-4ab4-a442-8c06062e89ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3983", "type": "seen", "source": "https://t.me/cvedetector/2215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3983 - \"WooCommerce Customers Manager CSRF Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-3983 \nPublished : Aug. 1, 2024, 6:15 a.m. | 22\u00a0minutes ago \nDescription : The WooCommerce Customers Manager WordPress plugin before 30.1 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T08:44:04.000000Z"}, {"uuid": "728578bf-614d-4528-8383-1465a724234d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39833", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16248", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39833\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Uncontrolled search path for some Intel(R) QAT software before version 2.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-13T21:03:06.096Z\n\ud83d\udccf Modified: 2025-05-13T21:03:06.096Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01216.html", "creation_timestamp": "2025-05-13T21:31:09.000000Z"}, {"uuid": "aa160f8d-f8a3-468e-bcdb-d1f42c737f16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39837", "type": "seen", "source": "https://t.me/cvedetector/2242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39837 - Mattermost Remote Channel Creation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39837 \nPublished : Aug. 1, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Mattermost versions 9.9.x Severity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:55:57.000000Z"}, {"uuid": "edabeca1-ed4a-4aff-8cce-db0536b51491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39832", "type": "seen", "source": "https://t.me/cvedetector/2244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39832 - Mattermost Local Data Deletion Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39832 \nPublished : Aug. 1, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Mattermost versions 9.9.x Severity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:56:02.000000Z"}]}