{"vulnerability": "CVE-2024-3996", "sightings": [{"uuid": "14cfb818-a439-46af-ba86-e87583aa1579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113596557492926848", "content": "", "creation_timestamp": "2024-12-04T20:58:30.217864Z"}, {"uuid": "4321f2b7-4e7c-47d5-ad76-299d3facefc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113834825785209912", "content": "", "creation_timestamp": "2025-01-15T22:53:15.060564Z"}, {"uuid": "5c7560f9-c4a8-46e4-88c6-31369c74753a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsvhj533q2f", "content": "", "creation_timestamp": "2025-01-15T23:15:37.858350Z"}, {"uuid": "b6aa460e-b1d1-415a-9077-767546026ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsy52whxq2y", "content": "", "creation_timestamp": "2025-01-16T00:03:28.660114Z"}, {"uuid": "bc53fef6-9d02-4dfb-b076-8aa8f504c215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1879", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39967\n\ud83d\udd39 Description: Insecure permissions in Aginode GigaSwitch v5 allows attackers to access sensitive information via using the SCP command.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T22:50:59.361067\n\ud83d\udd17 References:\n1. https://blog.hackvens.fr/advisories/CVE-2024-39967-CVE-2024-39219-GigaSwitch.html", "creation_timestamp": "2025-01-15T22:55:07.000000Z"}, {"uuid": "92e3ad4b-2e83-4e2c-9dce-64c07dc3ba23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39967", "type": "seen", "source": "https://t.me/cvedetector/15545", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39967 - Aginode GigaSwitch Remote File Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-39967 \nPublished : Jan. 15, 2025, 11:15 p.m. | 34\u00a0minutes ago \nDescription : Insecure permissions in Aginode GigaSwitch v5 allows attackers to access sensitive information via using the SCP command. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T01:10:41.000000Z"}, {"uuid": "5ba28b9a-0a3e-4921-bd8f-508225d20f13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3996", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16561", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3996\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Smart Post Show  WordPress plugin before 2.4.28 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)\n\ud83d\udccf Published: 2025-05-15T20:09:44.958Z\n\ud83d\udccf Modified: 2025-05-15T20:09:44.958Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/4035e3f9-89fe-49e1-8aa2-55ab3f1aa528/", "creation_timestamp": "2025-05-15T20:33:43.000000Z"}, {"uuid": "8c9e3c34-3a10-484f-9763-5708dfd3189a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39962", "type": "seen", "source": "https://t.me/cvedetector/1215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39962 - D-Link DIR-823X Router RCE\", \n  \"Content\": \"CVE ID : CVE-2024-39962 \nPublished : July 19, 2024, 3:15 p.m. | 31\u00a0minutes ago \nDescription : D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T17:52:52.000000Z"}, {"uuid": "7101781a-3992-4934-846d-2c12005bc0cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39963", "type": "seen", "source": "https://t.me/cvedetector/1218", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39963 - Netgear AX3000 Wi-Fi Router Remote Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39963 \nPublished : July 19, 2024, 3:15 p.m. | 31\u00a0minutes ago \nDescription : AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 and AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 were discovered to contain an authenticated remote command execution (RCE) vulnerability via the macFilterType parameter at /goform/setMacFilterCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T17:52:55.000000Z"}]}