{"vulnerability": "CVE-2024-2379", "sightings": [{"uuid": "6066b54c-67ed-416e-9bc4-c8ae2144d843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23794", "type": "seen", "source": "https://t.me/cvedetector/852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23794 - An incorrect privilege assignment vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2024-23794 \nPublished : July 15, 2024, 8:15 a.m. | 43\u00a0minutes ago \nDescription : An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting 'RequiredLock' of 'AgentFrontend::Ticket::InlineEditing::Property###Watch' in the system configuration.This issue affects OTRS:\u00a0  \n  \n  *  8.0.X  \n  *  2023.X  \n  *  from 2024.X through 2024.4.x \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T10:59:33.000000Z"}, {"uuid": "4e4e13da-d8f4-46be-ab53-9fc4b2fb0aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2379", "type": "seen", "source": "https://t.me/ctinow/213427", "content": "https://ift.tt/ENuASZY\nInternet Bug Bounty: CVE-2024-2379: QUIC certificate check bypass with wolfSSL", "creation_timestamp": "2024-03-29T20:51:30.000000Z"}, {"uuid": "752fffe5-f8ca-4062-b7f3-e1fdc46386d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23799", "type": "seen", "source": "https://t.me/ctinow/199059", "content": "https://ift.tt/lAw2dDW\nCVE-2024-23799 | Siemens Tecnomatix Plant Simulation prior 2302.0007 SPP File null pointer dereference (ssa-017796)", "creation_timestamp": "2024-03-04T08:11:42.000000Z"}, {"uuid": "77492e88-9e5e-4513-b28d-8dc871315138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23798", "type": "seen", "source": "https://t.me/ctinow/183706", "content": "https://ift.tt/XFBW6qK\nCVE-2024-23798", "creation_timestamp": "2024-02-13T10:22:08.000000Z"}, {"uuid": "5e9523e9-9c86-40fb-9bae-a91e495d46f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23797", "type": "seen", "source": "https://t.me/ctinow/183705", "content": "https://ift.tt/hZY0eJG\nCVE-2024-23797", "creation_timestamp": "2024-02-13T10:22:06.000000Z"}, {"uuid": "763f6673-e991-4be4-949a-47608bc6c0ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23796", "type": "seen", "source": "https://t.me/ctinow/183704", "content": "https://ift.tt/b9ajnKw\nCVE-2024-23796", "creation_timestamp": "2024-02-13T10:22:05.000000Z"}, {"uuid": "d5712f63-ecda-4aea-b278-1189e77e770a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23795", "type": "seen", "source": "https://t.me/ctinow/183703", "content": "https://ift.tt/3sObYPL\nCVE-2024-23795", "creation_timestamp": "2024-02-13T10:22:04.000000Z"}, {"uuid": "7c0990c5-e89e-4725-a83d-6391fab5b130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23799", "type": "seen", "source": "https://t.me/ctinow/183707", "content": "https://ift.tt/VEcNIDz\nCVE-2024-23799", "creation_timestamp": "2024-02-13T10:22:09.000000Z"}, {"uuid": "6ca0be5f-23b5-4594-bbf9-a1fc323f570d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2379", "type": "seen", "source": "https://t.me/arpsyndicate/4411", "content": "#ExploitObserverAlert\n\nCVE-2024-2379\n\nDESCRIPTION: Exploit Observer has 8 entries in 2 file formats related to CVE-2024-2379. libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T20:08:09.000000Z"}, {"uuid": "8b0290a0-de1e-4a84-bf00-3ef026bbc6ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23791", "type": "seen", "source": "https://t.me/ctinow/189535", "content": "https://ift.tt/w5BTcyt\nCVE-2024-23791 | OTRS up to 7.0.48/8.0.37/2023.1.1 Debug Information log file", "creation_timestamp": "2024-02-21T12:41:37.000000Z"}, {"uuid": "ae122555-8129-4c77-9a32-eea79b81fc04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23792", "type": "seen", "source": "https://t.me/ctinow/189512", "content": "https://ift.tt/C5aeYN6\nCVE-2024-23792 | OTRS up to 7.0.48/8.0.37/2023.1.1 Add Attachment improper authentication", "creation_timestamp": "2024-02-21T12:11:20.000000Z"}, {"uuid": "712f3bf3-6794-43e0-a1fd-11f01a8690fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23790", "type": "seen", "source": "https://t.me/ctinow/189534", "content": "https://ift.tt/oA3jw91\nCVE-2024-23790 | OTRS up to 7.0.48/8.0.37/2023.1.1 User Avatar unrestricted upload", "creation_timestamp": "2024-02-21T12:41:36.000000Z"}, {"uuid": "f94415f7-5904-423d-a7c1-7fc987a2e77b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2379", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-04", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "55aaae1f-71e5-4e1f-a284-dd03c7df0417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2379", "type": "seen", "source": "https://t.me/ctinow/212981", "content": "https://ift.tt/EGa0BPH\ncurl: CVE-2024-2379: QUIC certificate check bypass with wolfSSL", "creation_timestamp": "2024-03-27T10:57:00.000000Z"}, {"uuid": "08f9690f-9869-47a4-a83d-546d26e5b8aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23792", "type": "seen", "source": "https://t.me/ctinow/175168", "content": "https://ift.tt/r3Ze91g\nCVE-2024-23792", "creation_timestamp": "2024-01-29T11:26:26.000000Z"}, {"uuid": "92c66338-fdea-4910-a21c-6c7c925ef273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23791", "type": "seen", "source": "https://t.me/ctinow/175167", "content": "https://ift.tt/QlqANYk\nCVE-2024-23791", "creation_timestamp": "2024-01-29T11:26:25.000000Z"}, {"uuid": "0947d081-ab0b-4d49-ae1d-f2cefb3f1670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23790", "type": "seen", "source": "https://t.me/ctinow/175166", "content": "https://ift.tt/O7FzlGe\nCVE-2024-23790", "creation_timestamp": "2024-01-29T11:26:21.000000Z"}]}