{"vulnerability": "cve-2024-2319", "sightings": [{"uuid": "7e8e88d7-618c-466d-8189-fd638930a4bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23198", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23198\n\ud83d\udd39 Description: Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.\n\ud83d\udccf Published: 2024-11-13T20:36:09.103Z\n\ud83d\udccf Modified: 2025-01-10T15:55:29.318Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html", "creation_timestamp": "2025-01-10T16:03:00.000000Z"}, {"uuid": "a19a4186-3416-4dab-b824-e4a361db8e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23190", "type": "seen", "source": "https://t.me/arpsyndicate/4634", "content": "#ExploitObserverAlert\n\nCVE-2024-23190\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-23190. Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.7672484", "creation_timestamp": "2024-04-13T02:26:56.000000Z"}, {"uuid": "6f42791b-3dbd-4327-b56b-851ad10fa4ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23196", "type": "seen", "source": "https://t.me/ctinow/196349", "content": "https://ift.tt/cQxUsEF\nCVE-2024-23196 | Linux Kernel up to 6.4 HDA Device Driver snd_hdac_regmap_sync null pointer dereference", "creation_timestamp": "2024-02-29T08:47:08.000000Z"}, {"uuid": "5ca533b6-f5e3-4349-96ad-57bdf2d9e4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23196", "type": "seen", "source": "https://t.me/ctinow/179065", "content": "https://ift.tt/iTYB5n0\nCVE-2024-23196", "creation_timestamp": "2024-02-05T09:31:33.000000Z"}, {"uuid": "8b597bcb-6465-43fb-aff3-978760fdaea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23198", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113477573507585327", "content": "", "creation_timestamp": "2024-11-13T20:39:17.994773Z"}, {"uuid": "bc82b5b2-baf3-4e12-8f50-4d8298f5bacb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2319", "type": "seen", "source": "https://t.me/ctinow/203387", "content": "https://ift.tt/0Bf1tCZ\nCVE-2024-2319", "creation_timestamp": "2024-03-08T15:26:24.000000Z"}, {"uuid": "e3eb8301-74b6-4c40-b9e2-0f15cfacbb70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2319", "type": "seen", "source": "https://t.me/ctinow/203382", "content": "https://ift.tt/0Bf1tCZ\nCVE-2024-2319", "creation_timestamp": "2024-03-08T15:26:18.000000Z"}, {"uuid": "4a5946a8-2db2-4e77-9eb6-8a699786d60d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23196", "type": "seen", "source": "https://t.me/ctinow/180029", "content": "https://ift.tt/VhNWbex\nCVE-2024-23196", "creation_timestamp": "2024-02-06T14:46:33.000000Z"}, {"uuid": "8131045f-9e81-4be0-8943-77b70b67edc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23199", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6421", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23199\nURL\uff1ahttps://github.com/l00neyhacker/CVE-2024-23199\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-01-14T22:00:56.000000Z"}, {"uuid": "fb0e08f5-15f6-416d-938e-e151c9ac5ea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23194", "type": "seen", "source": "https://t.me/cvedetector/626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23194 - Improper output Neutralization for Logs (CWE-117)\", \n  \"Content\": \"CVE ID : CVE-2024-23194 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : Improper output Neutralization for Logs (CWE-117) in the Command Centre API\u00a0Diagnostics Endpoint could allow an attacker limited ability to modify Command Centre log files.   \n  \nThis issue affects:\u00a0Gallagher Command Centre v9.10 prior to vEL9.10.1268 (MR1). \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:25.000000Z"}, {"uuid": "52e0e4d4-11d9-44d8-89aa-0df9e0b9aeaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23192", "type": "seen", "source": "https://t.me/arpsyndicate/4614", "content": "#ExploitObserverAlert\n\nCVE-2024-23192\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-23192. RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.7373563", "creation_timestamp": "2024-04-13T00:47:48.000000Z"}]}