{"vulnerability": "CVE-2024-2119", "sightings": [{"uuid": "92815ea1-8189-4de8-8987-293e1abf7a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21196", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21196\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2024-10-15T19:52:36.816Z\n\ud83d\udccf Modified: 2025-03-13T16:19:23.339Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuoct2024.html", "creation_timestamp": "2025-03-13T16:45:40.000000Z"}, {"uuid": "a2d93e8d-bea1-44b2-8721-6f26ae55e367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21194", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21194\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\ud83d\udccf Published: 2024-10-15T19:52:35.850Z\n\ud83d\udccf Modified: 2025-03-13T13:38:13.953Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuoct2024.html", "creation_timestamp": "2025-03-13T13:44:51.000000Z"}, {"uuid": "76c1e88f-ea80-46c3-82ec-4bf1a74d3e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21195", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21195\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Layout Templates).  Supported versions that are affected are 7.0.0.0.0, 7.6.0.0.0 and  12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as  unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle BI Publisher. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).\n\ud83d\udccf Published: 2024-10-15T19:52:36.335Z\n\ud83d\udccf Modified: 2025-03-13T16:21:50.525Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuoct2024.html", "creation_timestamp": "2025-03-13T16:45:37.000000Z"}]}