{"vulnerability": "CVE-2024-42733", "sightings": [{"uuid": "aa510f8e-4134-4ede-8240-b6db66935f7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljtasxkivi2m", "content": "", "creation_timestamp": "2025-03-08T00:19:39.753449Z"}, {"uuid": "8afb7245-ebc1-4ae0-a02d-42584fac7887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:35.000000Z"}, {"uuid": "b2402dec-0da1-4a7d-b288-38615f059a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114139393262451657", "content": "", "creation_timestamp": "2025-03-10T17:48:46.271026Z"}, {"uuid": "df48fa83-53d4-44f1-a1c5-dc249bd93a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "65369669-c6a2-4b8b-b8e8-70b82706f766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "seen", "source": "https://t.me/cvedetector/19869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42733 - Docmosis Tornado Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-42733 \nPublished : March 7, 2025, 9:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : An issue in Docmosis Tornado v.2.9.7 and before allows a remote attacker to execute arbitrary code via a crafted script to the UNC path input \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T00:58:49.000000Z"}, {"uuid": "51c0ce77-15c2-448e-9c8a-34de62712c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42733", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6878", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42733\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Docmosis Tornado v.2.9.7 and before allows a remote attacker to execute arbitrary code via a crafted script to the UNC path input\n\ud83d\udccf Published: 2025-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-07T20:23:26.850Z\n\ud83d\udd17 References:\n1. https://github.com/Docmosis/tornado-docker/issues/14\n2. https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md", "creation_timestamp": "2025-03-07T20:40:23.000000Z"}]}