{"vulnerability": "CVE-2024-0964", "sightings": [{"uuid": "1b35bac3-7685-4468-92f2-6c0b1c5284bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/179644", "content": "https://ift.tt/HpyV8oR\nCVE-2024-0964", "creation_timestamp": "2024-02-06T00:31:51.000000Z"}, {"uuid": "b351174b-e985-4be7-8f65-8cbe48e993ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/184208", "content": "https://ift.tt/ZwU6alD\nCVE-2024-0964 Exploit", "creation_timestamp": "2024-02-13T21:17:00.000000Z"}, {"uuid": "badae8b5-5465-4fec-97e1-1d4dad8fd994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/196539", "content": "https://ift.tt/8JeA6xd\nCVE-2024-0964 | gradio API Request path traversal", "creation_timestamp": "2024-02-29T11:56:08.000000Z"}, {"uuid": "a4535227-ee6c-479a-8a8c-500017d39343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/3731", "content": "New bug bounty(vulnerabilities) collector  \nRequirements\n    Chrome with GUI (If you encounter trouble with script execution, check the status of VMs GPU features, if available.)  Chrome WebDriver  \nPreview\n  # python3 main.py\n\n*2024-02-20 16:14:47.836189*\n\n1. Arbitrary File Reading due to Lack of Input Filepath Validation\n- Feb 6th 2024 / High (CVE-2024-0964)\n- gradio-app/gradio\n- https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n\n2. View Barcode Image leads to Remote (https://www.kitploit.com/search/label/Remote) Code Execution\n- Jan 31st 2024 / Critical (CVE: Not yet)\n- dolibarr/dolibarr\n- https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n\n  (delimiter-based file database)  # vim (https://www.kitploit.com/search/label/Vim) feeds.db\n\n1|2024-02-20 16:17:40.393240|7fe14fd58ca2582d66539b2fe178eeaed3524342|CVE-2024-0964|https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n2|2024-02-20 16:17:40.393987|c6b84ac808e7f229a4c8f9fbd073b4c0727e07e1|CVE: Not yet|https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n3|2024-02-20 16:17:40.394582|7fead9658843919219a3b30b8249700d968d0cc9|CVE: Not yet|https://huntr.com/bounties/d6cb06dc-5d10-4197-8f89-847c3203d953/\n4|2024-02-20 16:17:40.395094|81fecdd74318ce7da9bc29e81198e62f3225bd44|CVE: Not yet|https://huntr.com/bounties/d875d1a2-7205-4b2b-93cf-439fa4c4f961/\n5|2024-02-20 16:17:40.395613|111045c8f1a7926174243db403614d4a58dc72ed|CVE: Not yet|https://huntr.com/bounties/10e423cd-7051-43fd-b736-4e18650d0172/\n  \nNotes\n    This code is designed to parse HTML elements from huntr.com, so it may not function correctly if the HTML page structure changes.   In case of errors during parsing, exception handling has been included, so if it doesn't work as expected, please inspect the HTML source for any changes.  If get in trouble In a typical cloud (https://www.kitploit.com/search/label/Cloud) environment, scripts (https://www.kitploit.com/search/label/Scripts) may not function properly within virtual machines (VMs).  \n\nDownload Huntr-Com-Bug-Bounties-Collector (https://github.com/password123456/huntr-com-bug-bounties-collector)", "creation_timestamp": "2024-02-27T12:27:53.000000Z"}, {"uuid": "dd92e51f-c6b4-4736-ad23-ddcff1eee7b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "Telegram/ATWlFfIu5qWEQDH47BmrNR9JfZ7EfYdxf77C7yA6RXUqUg", "content": "", "creation_timestamp": "2024-02-27T15:01:42.000000Z"}]}