{"vulnerability": "CVE-2024-3478", "sightings": [{"uuid": "f0e76c1b-80b0-4533-b8cc-a958604ca57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34787", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1501/", "content": "", "creation_timestamp": "2024-11-13T06:00:00.000000Z"}, {"uuid": "d4f91d6a-eadc-447f-a280-4bc948b91f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34781", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1497/", "content": "", "creation_timestamp": "2024-11-13T06:00:00.000000Z"}, {"uuid": "b7b67d8e-4123-4dfc-81c8-c33df30b2f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34784", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1500/", "content": "", "creation_timestamp": "2024-11-13T06:00:00.000000Z"}, {"uuid": "44d96d7a-bf3c-4cee-a203-44fb89c1dff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34782", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1499/", "content": "", "creation_timestamp": "2024-11-13T06:00:00.000000Z"}, {"uuid": "fb774f0c-957d-45b3-81bf-d723b98e0505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34781", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1498/", "content": "", "creation_timestamp": "2024-11-13T06:00:00.000000Z"}, {"uuid": "3678eeb5-4e11-4b7c-abb6-ddfe379b94dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34785", "type": "seen", "source": "https://t.me/cvedetector/5421", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34785 - Ivanti EPM SQL Injection RCE\", \n  \"Content\": \"CVE ID : CVE-2024-34785 \nPublished : Sept. 12, 2024, 2:15 a.m. | 21\u00a0minutes ago \nDescription : An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T04:44:40.000000Z"}, {"uuid": "948f63fe-446f-43a1-a043-8c5487c1e1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34783", "type": "seen", "source": "https://t.me/cvedetector/5418", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34783 - Ivanti EPM Remote Authenticated SQL Injection RCE\", \n  \"Content\": \"CVE ID : CVE-2024-34783 \nPublished : Sept. 12, 2024, 2:15 a.m. | 21\u00a0minutes ago \nDescription : An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T04:44:37.000000Z"}, {"uuid": "321666d1-fb91-47c1-b709-37ac3f0e6cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34788", "type": "seen", "source": "https://t.me/cvedetector/2671", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34788 - Citrix EPMM Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-34788 \nPublished : Aug. 7, 2024, 4:17 a.m. | 36\u00a0minutes ago \nDescription : An improper authentication vulnerability in web component of EPMM prior to 12.1.0.1 allows a remote malicious user to access potentially sensitive information \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T06:56:19.000000Z"}, {"uuid": "a4181091-0115-44e9-93fa-73392c66deb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34781", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473436500635075", "content": "", "creation_timestamp": "2024-11-13T03:07:12.240243Z"}, {"uuid": "9dbb5ad3-8481-42d8-8ab0-4f3c8c2cdd54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34784", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473495515800861", "content": "", "creation_timestamp": "2024-11-13T03:22:14.115473Z"}, {"uuid": "a8eff8db-f6e7-4f90-a2cf-c294692c98e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34780", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473436487046120", "content": "", "creation_timestamp": "2024-11-13T03:07:12.072529Z"}, {"uuid": "c824194d-e9c0-4807-90f4-ce4066540a18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34787", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473495529817510", "content": "", "creation_timestamp": "2024-11-13T03:22:14.351119Z"}, {"uuid": "59e3cef4-8411-4614-91a4-cc880ed0579b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34782", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473436515711539", "content": "", "creation_timestamp": "2024-11-13T03:07:12.458464Z"}, {"uuid": "a2b87d82-635a-4be9-b857-84113ee72e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34787", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/66553903-f96d-485e-b1f9-0f25e2695b51", "content": "", "creation_timestamp": "2024-11-13T09:12:33.737749Z"}, {"uuid": "b6d39be3-5bd7-4d0e-8c90-eec618e85c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34780", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/66553903-f96d-485e-b1f9-0f25e2695b51", "content": "", "creation_timestamp": "2024-11-13T09:12:33.737749Z"}, {"uuid": "ba9fd704-8d42-422c-b861-755db2fe2de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34781", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/66553903-f96d-485e-b1f9-0f25e2695b51", "content": "", "creation_timestamp": "2024-11-13T09:12:33.737749Z"}, {"uuid": "19557961-186b-480d-90d9-c3afb2154f25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34784", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/66553903-f96d-485e-b1f9-0f25e2695b51", "content": "", "creation_timestamp": "2024-11-13T09:12:33.737749Z"}, {"uuid": "9148ffb2-1617-41af-9c7f-382dc4fe8b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34782", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/66553903-f96d-485e-b1f9-0f25e2695b51", "content": "", "creation_timestamp": "2024-11-13T09:12:33.737749Z"}, {"uuid": "f2567d5e-6fdc-4a5f-b9a5-b27b1ea0d174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34787", "type": "seen", "source": "https://t.me/cvedetector/10783", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34787 - Ivanti Endpoint Manager Unauthenticated Code Execution Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-34787 \nPublished : Nov. 13, 2024, 2:15 a.m. | 43\u00a0minutes ago \nDescription : Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:07:31.000000Z"}, {"uuid": "9621d572-c548-4528-aa97-481f1ea0c68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34784", "type": "seen", "source": "https://t.me/cvedetector/10782", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34784 - \"Ivanti Endpoint Manager SQL Injection RCE Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-34784 \nPublished : Nov. 13, 2024, 2:15 a.m. | 43\u00a0minutes ago \nDescription : SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:07:31.000000Z"}, {"uuid": "8886aaf8-732c-41f4-a9da-4b75baac9a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34782", "type": "seen", "source": "https://t.me/cvedetector/10781", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34782 - Ivanti Endpoint Manager SQL Injection Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-34782 \nPublished : Nov. 13, 2024, 2:15 a.m. | 43\u00a0minutes ago \nDescription : SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:07:30.000000Z"}, {"uuid": "4c8bb765-e2be-47ba-b31f-6e43c11e2b25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34781", "type": "seen", "source": "https://t.me/cvedetector/10780", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34781 - Ivanti Endpoint Manager SQL Injection Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-34781 \nPublished : Nov. 13, 2024, 2:15 a.m. | 43\u00a0minutes ago \nDescription : SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:07:29.000000Z"}, {"uuid": "637a9114-e754-4365-b894-288f4270f03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34780", "type": "seen", "source": "https://t.me/cvedetector/10779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34780 - Ivanti Endpoint Manager SQL Injection RCE\", \n  \"Content\": \"CVE ID : CVE-2024-34780 \nPublished : Nov. 13, 2024, 2:15 a.m. | 43\u00a0minutes ago \nDescription : SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:07:29.000000Z"}, {"uuid": "7834c8ac-4064-415c-b75a-acf15d01c332", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34783", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1369", "content": "", "creation_timestamp": "2024-09-11T04:00:00.000000Z"}, {"uuid": "1599d973-6af5-43f3-af9b-6d05d882714a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34785", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1369", "content": "", "creation_timestamp": "2024-09-11T04:00:00.000000Z"}, {"uuid": "8678f4f4-f7ee-4b61-9b9a-3b22210aea79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34786", "type": "seen", "source": "https://t.me/cvedetector/224", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34786 - UniFi iOS app 10.15.0 introduces a misconfiguratio\", \n  \"Content\": \"CVE ID : CVE-2024-34786 \nPublished : July 9, 2024, 2:15 a.m. | 25\u00a0minutes ago \nDescription : UniFi iOS app 10.15.0 introduces a misconfiguration on 2nd Generation UniFi Access Points configured as standalone (not using UniFi Network Application) that could cause the SSID name to change and/or the WiFi Password to be removed on the 5GHz Radio.  \n  \nThis vulnerability is fixed in UniFi iOS app 10.15.2 and later. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T04:42:37.000000Z"}]}