{"vulnerability": "CVE-2024-4293", "sightings": [{"uuid": "cf403db4-ed78-4851-8738-0f969b514401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42936", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113867985787969906", "content": "", "creation_timestamp": "2025-01-21T19:26:16.584883Z"}, {"uuid": "31f88872-e6b2-448e-998a-4afa142ac65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42936", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbo7sw4dn2j", "content": "", "creation_timestamp": "2025-01-21T20:15:59.534479Z"}, {"uuid": "da093d3d-7c23-44c5-b3fb-5be4f152a9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42936", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbptgpl6r2w", "content": "", "creation_timestamp": "2025-01-21T20:44:54.699154Z"}, {"uuid": "efe37b54-2220-4428-9c83-ba286d5cbe7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42936", "type": "seen", "source": "https://t.me/cvedetector/16009", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42936 - Ruijie RG-EW300N MQTT Broker Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42936 \nPublished : Jan. 21, 2025, 8:15 p.m. | 38\u00a0minutes ago \nDescription : The mqlink.elf is service component in Ruijie RG-EW300N with firmware ReyeeOS 1.300.1422 is vulnerable to Remote Code Execution via a modified MQTT broker message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T21:59:44.000000Z"}, {"uuid": "ffef5771-a480-4893-ab52-5fed9b111ee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42936", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2749", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42936\n\ud83d\udd39 Description: The mqlink.elf is service component in Ruijie RG-EW300N with firmware ReyeeOS 1.300.1422 is vulnerable to Remote Code Execution via a modified MQTT broker message.\n\ud83d\udccf Published: 2025-01-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T15:56:09.936Z\n\ud83d\udd17 References:\n1. https://gist.github.com/smrx86/2008111b12ab47882b3928d0cbc9e415", "creation_timestamp": "2025-01-23T16:02:52.000000Z"}, {"uuid": "df4aadef-5f5b-4f24-bfba-a8d03df97295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42930", "type": "seen", "source": "https://t.me/cvedetector/9178", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42930 - PbootCMS Cross-Site Web Server Redirect Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-42930 \nPublished : Oct. 28, 2024, 8:15 p.m. | 42\u00a0minutes ago \nDescription : PbootCMS 3.2.8 is vulnerable to URL Redirect. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T22:01:36.000000Z"}, {"uuid": "af619af8-757b-4136-bd91-bdbcc728dce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42939", "type": "seen", "source": "https://t.me/cvedetector/3722", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42939 - YZNCMS Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42939 \nPublished : Aug. 21, 2024, 5:15 a.m. | 41\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in the component /index/index.html of YZNCMS v1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the configured remarks text field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T08:11:23.000000Z"}, {"uuid": "53388f26-ef00-4b3a-9f71-f2833019172f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42934", "type": "seen", "source": "https://t.me/cvedetector/7426", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42934 - OpenIPMI Array Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42934 \nPublished : Oct. 9, 2024, 5:15 a.m. | 42\u00a0minutes ago \nDescription : OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T08:07:10.000000Z"}]}