{"vulnerability": "CVE-2024-9537", "sightings": [{"uuid": "248dacf1-c095-4d46-a907-3fc24e4f56e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-21T18:10:02.000000Z"}, {"uuid": "9f957bcb-2b2e-446a-9f93-4671ed4d5947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "MISP/ff02df75-44e3-42ce-8643-4c9d125956fd", "content": "", "creation_timestamp": "2024-10-29T00:08:05.000000Z"}, {"uuid": "98596954-4c6c-407a-8400-c27d968fcbd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-9537", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2c0e9e5d-36c0-41cb-851d-34c5e0eb980f", "content": "", "creation_timestamp": "2026-02-02T12:26:25.739698Z"}, {"uuid": "a14cd501-656a-45dc-bbb9-012a882f1db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "c273df05-1d7d-40d2-b0bb-d96629a7a146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9537\n\ud83c\udfe2 Vendor: ScienceLogic\n\ud83d\udda5\ufe0f Product: SL1\n\ud83d\udd39 Description: ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.\n\ud83d\udccf Published: 2024-09-28T00:00:00Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json\n2. https://x.com/ynezzor/status/1839931641172467907\n3. https://www.cve.org/CVERecord?id=CVE-2024-9537", "creation_timestamp": "2025-02-08T23:20:29.000000Z"}, {"uuid": "8886fc0c-1921-4ea8-be59-bb796ba0e25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/CyberBulletin/1204", "content": "\u26a1\ufe0fCVE-2024-9537 (CVSS 9.8): Critical Zero-Day in ScienceLogic EM7 Leads to Rackspace Security Incident.\n\n#CyberBulletin", "creation_timestamp": "2024-10-22T14:49:53.000000Z"}, {"uuid": "0eae75c9-b4bf-49b6-900d-5629082f2833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "exploited", "source": "Telegram/sI2ATVBkw-oMYrXA-nGqhs8IH2i-eL4LsIWW8hnR0KjFUg", "content": "", "creation_timestamp": "2024-10-22T07:48:16.000000Z"}, {"uuid": "c62da9a5-3ff3-4fa2-a1d3-892cfd8ab2d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/cvedetector/8330", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9537 - ScienceLogic SL1 Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9537 \nPublished : Oct. 18, 2024, 3:15 p.m. | 22\u00a0minutes ago \nDescription : ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+.  Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T17:45:15.000000Z"}, {"uuid": "c8c000c9-9eb4-437d-8e45-8ce34832443a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "exploited", "source": "Telegram/c5bLibPZ8OAH9v8I6tMCVhxo05mGj0wB8cbewIj4lVCjXg", "content": "", "creation_timestamp": "2024-10-22T08:16:12.000000Z"}, {"uuid": "c273cb75-0ca1-4b8f-9bfc-1534b8998376", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "exploited", "source": "https://t.me/KomunitiSiber/2748", "content": "CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack\nhttps://thehackernews.com/2024/10/cisa-adds-sciencelogic-sl1.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day.\nThe vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug involving an unspecified third-party component that could", "creation_timestamp": "2024-10-22T09:13:32.000000Z"}, {"uuid": "bbe2c429-f96b-424d-b8fa-39bb453cb254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/thehackernews/5764", "content": "\u26a0\ufe0f CISA has added a critical zero-day vulnerability (CVE-2024-9537) affecting ScienceLogic SL1 to its KEV catalog. \n \nThis flaw, with a staggering CVSS score of 9.3, allows for remote code execution. \n \nRead \ud83d\udc49 https://thehackernews.com/2024/10/cisa-adds-sciencelogic-sl1.html \n \nApply the latest patches.", "creation_timestamp": "2024-10-22T08:22:30.000000Z"}, {"uuid": "70f0965c-56e1-403d-a740-74c9ad39cad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/InfoSecInsider/24139", "content": "\u26a1\ufe0fCVE-2024-9537 (CVSS 9.8): Critical Zero-Day in ScienceLogic EM7 Leads to Rackspace Security Incident.\n\n#CyberBulletin", "creation_timestamp": "2024-10-22T15:06:28.000000Z"}, {"uuid": "a2ff537c-7ac2-48f2-a215-ef8f31866333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/CyberBulletin/26137", "content": "\u26a1\ufe0fCVE-2024-9537 (CVSS 9.8): Critical Zero-Day in ScienceLogic EM7 Leads to Rackspace Security Incident.\n\n#CyberBulletin", "creation_timestamp": "2024-10-22T14:49:53.000000Z"}, {"uuid": "698b1dea-cfb5-4fde-ab27-107cfa2a7f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9537", "type": "seen", "source": "https://t.me/InfoSecInsider/526", "content": "\u26a1\ufe0fCVE-2024-9537 (CVSS 9.8): Critical Zero-Day in ScienceLogic EM7 Leads to Rackspace Security Incident.\n\n#CyberBulletin", "creation_timestamp": "2024-10-22T15:06:35.000000Z"}]}