{"vulnerability": "CVE-2024-53703", "sightings": [{"uuid": "d15ae0f7-f7d5-4017-afa6-8573e7d4c30f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://t.me/cvedetector/12099", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53703 - A vulnerability in the SonicWall SMA100 SSLVPN fir\", \n  \"Content\": \"CVE ID : CVE-2024-53703 \nPublished : Dec. 5, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T16:11:44.000000Z"}, {"uuid": "afff2b9c-382e-46a9-9dbe-fdc33c89e1ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113600185597148773", "content": "", "creation_timestamp": "2024-12-05T12:21:10.355497Z"}, {"uuid": "7317eb9f-7091-46f8-8db5-bc30379930b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600591074454415", "content": "", "creation_timestamp": "2024-12-05T14:04:17.127892Z"}, {"uuid": "acf74219-2ca1-4cc9-abaa-260488979394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114630758690927812", "content": "", "creation_timestamp": "2025-06-05T12:29:27.964037Z"}, {"uuid": "eb406802-ccf8-4d84-bfd1-73bf84bfcb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/ff9a96b8-41b6-43fe-b430-913aad09c4c7", "content": "", "creation_timestamp": "2025-05-05T07:56:53.581572Z"}, {"uuid": "2da049f9-80af-41f1-b183-248fae7e4262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "published-proof-of-concept", "source": "Telegram/ZL3fsK9qCSRiY5p4gb42n3d5a1f4yGvqeGw-xMP0DkCbV0U", "content": "", "creation_timestamp": "2025-06-05T15:00:06.000000Z"}, {"uuid": "2e9033b5-e73f-41b5-a478-90fdb77c4898", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53703", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113606395389007280", "content": "", "creation_timestamp": "2024-12-06T14:40:23.921302Z"}]}