{"vulnerability": "CVE-2024-51442", "sightings": [{"uuid": "97ba8bfe-ded5-4fda-b591-f2abab06090a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113794698618597439", "content": "", "creation_timestamp": "2025-01-08T20:48:25.864459Z"}, {"uuid": "35d3f151-0dd0-4646-8145-78e03460d607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793865688702989", "content": "", "creation_timestamp": "2025-01-08T17:16:33.595337Z"}, {"uuid": "298a437a-10cf-4ec8-862a-22eae23cd3a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lepoeeupkr2c", "content": "", "creation_timestamp": "2025-01-01T23:05:27.181489Z"}, {"uuid": "f6677f63-0e00-4d01-a70d-4f59bd9f6d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfargo56dq2f", "content": "", "creation_timestamp": "2025-01-08T18:15:39.457724Z"}, {"uuid": "d370a295-c546-4d5a-91f0-a4bf23936a69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/819", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51442\n\ud83d\udd39 Description: Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file.\n\ud83d\udccf Published: 2025-01-08T00:00:00\n\ud83d\udccf Modified: 2025-01-08T19:46:55.729Z\n\ud83d\udd17 References:\n1. https://sourceforge.net/projects/minidlna/\n2. https://sourceforge.net/p/minidlna/git/ci/master/tree/minidlna.c\n3. https://sourceforge.net/p/minidlna/bugs/364/\n4. https://github.com/mselbrede/CVE-2024-51442", "creation_timestamp": "2025-01-08T20:14:23.000000Z"}, {"uuid": "d5112aba-0669-4b1b-97a2-f5493e2e25ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "seen", "source": "https://t.me/cvedetector/14722", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51442 - Minidlna Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51442 \nPublished : Jan. 8, 2025, 6:15 p.m. | 36\u00a0minutes ago \nDescription : Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T20:00:43.000000Z"}, {"uuid": "8f91785f-dc2a-4771-871a-1c2357c47852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51442", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9670", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-51442 write up and example config file\nURL\uff1ahttps://github.com/mselbrede/CVE-2024-51442\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-31T19:30:36.000000Z"}]}