{"vulnerability": "CVE-2024-2808", "sightings": [{"uuid": "293e5086-657b-4ba3-8e50-9257822109a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/cKure/12630", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking.\n\nThe bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante.\n\nhttps://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html", "creation_timestamp": "2024-03-30T01:38:44.000000Z"}, {"uuid": "50c5dbb5-effd-4986-8543-3099dd78ab25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/10165", "content": "Rage Against the Authentication State Machine\n\nhttps://blog.silentsignal.eu/2025/06/14/gitblit-cve-CVE-2024-28080/", "creation_timestamp": "2025-08-29T13:01:40.000000Z"}, {"uuid": "64fef4ec-72db-4ff5-a9aa-d7fc5579474b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/habr_com_news/26637", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u0432 \u043a\u043e\u0434\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b wall \u0438\u0437 \u043f\u0430\u043a\u0435\u0442\u0430 util-linux (\u0432\u0435\u0440\u0441\u0438\u0439 2.24 \u2014 2.39, \u043f\u0430\u0442\u0447 \u0432\u044b\u0448\u0435\u043b \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 2.40) \u0431\u043e\u043b\u0435\u0435 10 \u043b\u0435\u0442 (\u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2013 \u0433\u043e\u0434\u0430) \u0431\u044b\u043b\u0430 \u0441\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Wall-Escape (CVE-2024-28085), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0447\u0435\u0440\u0435\u0437 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u044e \u0441 escape-\u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044f\u043c\u0438.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c #\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430", "creation_timestamp": "2024-03-29T13:58:32.000000Z"}, {"uuid": "fe7a1a51-4bd1-467e-a02b-7e94b5b7702c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "Telegram/BGApFPAHoLEhVXDwAbaWgtJkmhuVFcjx1S2FNIIWCNfBUw", "content": "", "creation_timestamp": "2024-03-29T15:03:34.000000Z"}, {"uuid": "af2b51db-ab04-4d74-9dd7-af2e02d1e364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/864", "content": "The Hacker News\nNew Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking\n\nDetails have emerged about a vulnerability impacting the \"wall\" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the clipboard on certain Linux distributions.\nThe bug, tracked as CVE-2024-28085, has been codenamed&nbsp;WallEscape&nbsp;by security researcher Skyler Ferrante. It has been described as a case of improper", "creation_timestamp": "2024-03-29T15:03:35.000000Z"}, {"uuid": "af1f17ae-46f4-4eda-998f-0e689e8ba28c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/5585", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c WallEscape \u0432 \u0443\u0442\u0438\u043b\u0438\u0442\u0435 wall \u043f\u0440\u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430 \u0432\u043e \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u043f\u0430\u043a\u0435\u0442\u0430 util-linux \u0431\u043e\u043b\u0435\u0435 10 \u043b\u0435\u0442.\n\nCVE-2024-28085 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u0443\u0442\u0451\u043c \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0438 \u0441 escape-\u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044f\u043c\u0438.\n\n\u0418\u0441\u0442\u043e\u0440\u0438\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u043e\u0437\u0430\u0438\u0447\u043d\u0430, \u0432\u0435\u0434\u044c \u0445\u043e\u0442\u0435\u043b\u0438 \u043a\u0430\u043a \u043b\u0443\u0447\u0448\u0435, \u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u043e\u0441\u044c \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0438 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0438 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 2.24 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435 \u043f\u043e\u043f\u0440\u043e\u0441\u0442\u0443 \u043d\u0435 \u043f\u0440\u0435\u0434\u0443\u0441\u043c\u043e\u0442\u0440\u0435\u043b\u0438 \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u044e escape-\u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0435\u0439.\n\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0447\u0435\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043c\u043e\u0433 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044f SUDO \u043d\u0430 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430\u0445 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0432\u043e\u0448\u0435\u0434\u0448\u0438\u0445 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043e\u0431\u043c\u0430\u043d\u044b\u0432\u0430\u044f \u0438\u0445 \u0438 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0432\u0432\u043e\u0434\u0438\u0442\u044c \u0441\u0432\u043e\u0439 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u043f\u0430\u0440\u043e\u043b\u044c.\n\n\u0414\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u044b \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u0441\u043b\u043e\u0432\u0438\u044f: \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u043a Linux-\u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0447\u0435\u0440\u0435\u0437 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0443\u0442\u0438\u043b\u0438\u0442\u044b 'mesg' \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043d\u0430\u043b\u0438\u0447\u0438\u0435\u043c \u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u044b wall \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439 setgid.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 Ubuntu 22.04 LTS (Jammy Jellyfish) \u0438 Debian 12.5 (Bookworm), \u043d\u043e \u043d\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 CentOS.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0421\u043a\u0430\u0439\u043b\u0435\u0440 \u0424\u0435\u0440\u0440\u0430\u043d\u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0443\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC \u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0435 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0438, \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0438\u0435, \u043a\u0430\u043a \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043e\u043f\u0438\u0441\u0430\u043b \u043c\u0435\u0442\u043e\u0434\u0438\u043a\u0443, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0432\u0435\u0441\u0442\u0438 \u0441\u0432\u043e\u0439 \u043f\u0430\u0440\u043e\u043b\u044c, \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0432\u0432\u043e\u0434\u0438\u0442 \u0441\u0432\u043e\u0439 \u043f\u0430\u0440\u043e\u043b\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u044b sudo.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0440\u0430\u0431\u043e\u0442\u044b sudo \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0447\u0435\u0440\u0435\u0437 wall \u0444\u0438\u043a\u0442\u0438\u0432\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u0441 \u043f\u0440\u0438\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435\u043c \u043a \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u043c\u0443 \u0432\u0432\u043e\u0434\u0443 \u043f\u0430\u0440\u043e\u043b\u044f, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0435\u0433\u043e \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2024-03-29T16:30:05.000000Z"}, {"uuid": "b0fc5aa4-64a0-41e6-a02c-e82b6d60ee87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28089", "type": "seen", "source": "https://t.me/ctinow/203817", "content": "https://ift.tt/mRuQPvX\nCVE-2024-28089", "creation_timestamp": "2024-03-09T08:26:49.000000Z"}, {"uuid": "5906f75d-bfc4-4186-b328-6502c2fc43ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28084", "type": "seen", "source": "https://t.me/ctinow/198905", "content": "https://ift.tt/wmTbId2\nCVE-2024-28084", "creation_timestamp": "2024-03-03T22:32:00.000000Z"}, {"uuid": "928b0a03-717c-427a-bba5-5b2bf6e9c258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lxjnc5a2un2b", "content": "", "creation_timestamp": "2025-08-29T08:28:59.484534Z"}, {"uuid": "7b50a840-0ef1-4698-a8df-77328ed0467d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lxjnuyywif2r", "content": "", "creation_timestamp": "2025-08-29T08:39:32.451606Z"}, {"uuid": "35c1765e-27fa-488c-b777-a7a3b21bb319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "Telegram/Z5_dk9aHsug3Aaboqz37J5qq9R0sNH6j0ck4mFzTAEYe_Bg", "content": "", "creation_timestamp": "2024-03-29T14:32:19.000000Z"}, {"uuid": "23555b5c-335f-4e36-ac16-4055bea0f188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/4543", "content": "The Hacker News\nNew Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking\n\nDetails have emerged about a vulnerability impacting the \"wall\" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the clipboard on certain Linux distributions.\nThe bug, tracked as CVE-2024-28085, has been codenamed&nbsp;WallEscape&nbsp;by security researcher Skyler Ferrante. It has been described as a case of improper", "creation_timestamp": "2024-03-29T15:03:35.000000Z"}, {"uuid": "656c1331-a120-4d10-8135-3d10836e624a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/proxy_bar/1971", "content": "CVE-2024-28085 - \u0421\u043c\u0435\u0448\u043d\u0430\u044f \u0434\u044b\u0440\u043a\u0430 \u0432 Linux \ud83d\ude1c\n*\n\u0414\u044b\u0440\u043a\u0435 11 \u043b\u0435\u0442, \u0434\u044b\u0440\u043a\u0430 \u0435\u0441\u0442\u044c \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0432\u044b\u0448\u043b\u043e 27 \u043c\u0430\u0440\u0442\u0430 2024 \u0433\u043e\u0434\u0430.\n\u0414\u044b\u0440\u043a\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u0430 \u043d\u0430 Ubuntu 22.04 LTS \u0438 Debian 12.5\n\u041d\u043e \u0435\u0441\u0442\u044c \u043d\u044c\u044e\u0430\u043d\u0441, \u043d\u0443\u0436\u043d\u043e \u0443\u0436\u0435 \u0431\u044b\u0442\u044c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n*\n\u0412 \u043e\u0431\u0449\u0435\u043c \u043f\u043e\u0447\u0438\u0442\u0430\u0439\u0442\u0435, \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 sudo \u0437\u0430\u043f\u0440\u043e\u0441\u044b\n*\nPOC\n \n#linux #sudo", "creation_timestamp": "2024-03-29T05:47:29.000000Z"}, {"uuid": "d8c833fc-b8d3-4eea-9366-366bbd5c0407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/ctinow/213097", "content": "https://ift.tt/h36Jcyi\nEscape sequence injection in util-linux wall (CVE-2024-28085)", "creation_timestamp": "2024-03-27T17:32:04.000000Z"}, {"uuid": "971d6791-c2af-4d28-b5da-97de7d5bba85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28089", "type": "seen", "source": "https://t.me/ctinow/203823", "content": "https://ift.tt/mRuQPvX\nCVE-2024-28089", "creation_timestamp": "2024-03-09T08:26:58.000000Z"}, {"uuid": "2ffa3a70-9fe1-44b3-bce4-a188234469f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28088", "type": "seen", "source": "https://t.me/ctinow/198938", "content": "https://ift.tt/y38xfgv\nCVE-2024-28088", "creation_timestamp": "2024-03-04T01:26:47.000000Z"}, {"uuid": "962d16a5-2533-4d54-a963-1625fe38345f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28088", "type": "seen", "source": "https://t.me/ctinow/198935", "content": "https://ift.tt/y38xfgv\nCVE-2024-28088", "creation_timestamp": "2024-03-04T01:21:50.000000Z"}, {"uuid": "08f26fd9-9769-4560-a0bd-4c990842cacc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28084", "type": "seen", "source": "https://t.me/ctinow/198903", "content": "https://ift.tt/wmTbId2\nCVE-2024-28084", "creation_timestamp": "2024-03-03T22:26:23.000000Z"}, {"uuid": "a1b92e41-9339-4ac9-8968-ddfb3f4ab0a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10235", "content": "#exploit\n1. CVE-2024-1086:\nLinux kernel LPE PoC\nhttps://github.com/notselwyn/cve-2024-1086\n]-&gt; https://pwning.tech/nftables\n\n2. CVE-2024-28085:\nWallEscape vulnerability in util-linux\nhttps://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt\n]-&gt; https://github.com/skyler-ferrante/CVE-2024-28085", "creation_timestamp": "2024-11-19T17:32:41.000000Z"}, {"uuid": "f3ca9aa6-b4b5-49f1-b8cc-bf1e5bc328b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "ad64b205-3141-430f-a587-aa24abb0ae33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://securityboulevard.com/2025/09/gitblit-authentication-bypass-vulnerability-cve-2024-28080/", "content": "", "creation_timestamp": "2025-09-12T06:50:39.123079Z"}, {"uuid": "14d6d705-09b6-4b82-a479-d522bdbeb199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://bsky.app/profile/crowdcyber.bsky.social/post/3lxnsf77dot2m", "content": "", "creation_timestamp": "2025-08-31T00:10:50.239558Z"}, {"uuid": "603e87c4-beca-4624-a7b6-d106b50bd270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lxx46de2tk2b", "content": "", "creation_timestamp": "2025-09-03T16:59:54.540161Z"}, {"uuid": "fb9f6f9e-ca83-473c-bf72-5818be7a5eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8377", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExample Trojan  of CVE-2024-28085\nURL\uff1ahttps://github.com/oditynet/sleepall\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-27T08:07:45.000000Z"}, {"uuid": "0611de07-9589-4afe-8d5f-6d0e30f94e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28084", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9194", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28084\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.\n\ud83d\udccf Published: 2024-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T20:15:46.086Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d\n2. https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb\n3. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/\n4. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/", "creation_timestamp": "2025-03-27T20:27:10.000000Z"}, {"uuid": "ffeede52-d28d-4e77-a73d-eebbd80018e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://t.me/TopCyberTechNews/591", "content": "Top Security News for Today\n\nRage Against the Authentication State Machine (CVE-2024-28080)  \nhttps://www.reddit.com/r/netsec/comments/1n31plm/rage_against_the_authentication_state_machine/\n\nHow attackers adapt to built-in macOS protection  \nhttps://securelist.com/macos-security-and-typical-attacks/117367/\n\nCache Me If You Can (Sitecore Experience Platform Cache Poisoning to RCE) - watchTowr Labs  \nhttps://www.reddit.com/r/netsec/comments/1n33j71/cache_me_if_you_can_sitecore_experience_platform/\n\nBaggage Tag Scam  \nhttps://www.schneier.com/blog/archives/2025/08/baggage-tag-scam.html\n\nRansomware gang takedowns causing explosion of new, smaller groups  \nhttps://therecord.media/ransomware-gang-takedown-proliferation\n\nAI Waifu RAT: A Ring3 malware-like RAT based on LLM manipulation is circulating in the wild.  \nhttps://www.reddit.com/r/netsec/comments/1n3a1ll/ai_waifu_rat_a_ring3_malwarelike_rat_based_on_llm/\n\nHidden in plain sight: a misconfigured upload path that invited trouble  \nhttps://www.reddit.com/r/netsec/comments/1n3cu26/hidden_in_plain_sight_a_misconfigured_upload_path/\n\nOperation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa  \nhttps://www.trendmicro.com/en_us/research/25/h/operation-serengeti-trend-micro.html\n\nScammer steals $1.5 million from Baltimore by spoofing city vendor  \nhttps://therecord.media/scammer-steals-baltimore-city-impersonation-vendor\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-08-30T09:30:25.000000Z"}, {"uuid": "d6737c5e-80b0-4d1d-bfd1-e32aa757662a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "published-proof-of-concept", "source": "Telegram/t5hGOlrQ4D0rlr1YS_pQ9bSCnxZuA8zvL9vU1_E7ROf5GA", "content": "", "creation_timestamp": "2024-03-29T12:15:54.000000Z"}, {"uuid": "6663d467-b1d8-4173-a9f5-0821b49a9ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/KomunitiSiber/1709", "content": "New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking\nhttps://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html\n\nDetails have emerged about a vulnerability impacting the \"wall\" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the clipboard on certain Linux distributions.\nThe bug, tracked as CVE-2024-28085, has been codenamed\u00a0WallEscape\u00a0by security researcher Skyler Ferrante. It has been described as a case of improper", "creation_timestamp": "2024-03-29T12:09:59.000000Z"}, {"uuid": "3f370144-c008-4f6d-8552-b428e64db38c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28085", "type": "seen", "source": "https://t.me/thehackernews/4753", "content": "\ud83d\udcbb A new vulnerability, CVE-2024-28085, dubbed \"WallEscape,\" impacts the \"wall\" command in util-linux, potentially exposing passwords or altering clipboards on Linux distros like Ubuntu &amp; Debian. \n \nRead more \u279f https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html", "creation_timestamp": "2024-03-29T12:02:12.000000Z"}, {"uuid": "644324c2-352c-428b-aa00-7c1565807d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-28080", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lxm5b7ka4y2w", "content": "", "creation_timestamp": "2025-08-30T08:20:07.784005Z"}]}