{"vulnerability": "cve-2024-2380", "sightings": [{"uuid": "89068f9f-70c1-4886-b724-44b7530e63bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23809", "type": "seen", "source": "https://t.me/arpsyndicate/3817", "content": "#ExploitObserverAlert\n\nCVE-2024-23809\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-23809. A double-free vulnerability exists in the BrainVision ASCII Header Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-02-21T14:44:32.000000Z"}, {"uuid": "d84c9db6-aa89-4b61-a23c-4f29c45113fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23807", "type": "seen", "source": "https://t.me/ctinow/196129", "content": "https://ift.tt/O8oGJvw\nCVE-2024-23807", "creation_timestamp": "2024-02-29T03:03:00.000000Z"}, {"uuid": "a25311f6-b79d-4c63-8fcd-36dde2fa0152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23807", "type": "seen", "source": "https://t.me/ctinow/196112", "content": "https://ift.tt/O8oGJvw\nCVE-2024-23807", "creation_timestamp": "2024-02-29T02:56:25.000000Z"}, {"uuid": "07d54fb3-96d5-4950-bf6b-f46ce9f64964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23809", "type": "seen", "source": "https://t.me/ctinow/188764", "content": "https://ift.tt/2pI7MuP\nCVE-2024-23809", "creation_timestamp": "2024-02-20T17:25:54.000000Z"}, {"uuid": "04c7dcd8-76c8-4b02-ba88-4c848cbf95dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23806", "type": "seen", "source": "https://t.me/ctinow/180883", "content": "https://ift.tt/UaCWyrj\nCVE-2024-23806", "creation_timestamp": "2024-02-07T18:32:25.000000Z"}, {"uuid": "2145d14a-c728-442c-882c-fc37b7ed3788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23806", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18303", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23806\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Sensitive data can be extracted from HID iCLASS SE reader configuration cards. This could include credential and device administrator keys.\n\ud83d\udccf Published: 2024-02-07T16:23:16.889Z\n\ud83d\udccf Modified: 2025-06-13T15:07:44.967Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-02\n2. https://www.hidglobal.com/support", "creation_timestamp": "2025-06-13T15:36:38.000000Z"}, {"uuid": "4150cc36-2316-4903-afd6-551db99773db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23807", "type": "seen", "source": "https://t.me/ctinow/203164", "content": "https://ift.tt/9fdXmeT\nCVE-2024-23807 | Apache Xerces C++ up to 3.2.2 External DTD Scanning use after free", "creation_timestamp": "2024-03-08T09:26:15.000000Z"}, {"uuid": "6a459483-a23f-42da-a6cb-63eaa4b8226e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23807", "type": "seen", "source": "https://t.me/ctinow/186591", "content": "https://ift.tt/gswJNvr\nCVE-2024-23807", "creation_timestamp": "2024-02-16T19:31:50.000000Z"}, {"uuid": "51465cc9-edd4-42ba-9143-e4f30fb44fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23807", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "83a27b68-7f26-418b-8d31-87583754e3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23806", "type": "seen", "source": "https://t.me/ctinow/197660", "content": "https://ift.tt/IvPdrDQ\nCVE-2024-23806 | HID Global HID iCLASS SE Reader Configuration Card improper authorization (icsa-24-037-02)", "creation_timestamp": "2024-03-01T14:46:49.000000Z"}, {"uuid": "31a914d8-087f-4fb2-8b7a-41e8ac635fc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23801", "type": "seen", "source": "https://t.me/ctinow/199061", "content": "https://ift.tt/0LDSU8W\nCVE-2024-23801 | Siemens Tecnomatix Plant Simulation prior 2302.0007 SPP File null pointer dereference (ssa-017796)", "creation_timestamp": "2024-03-04T08:11:45.000000Z"}, {"uuid": "11637a52-d1f6-47d3-b587-96310d0cf0d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23800", "type": "seen", "source": "https://t.me/ctinow/199060", "content": "https://ift.tt/ozh8u1X\nCVE-2024-23800 | Siemens Tecnomatix Plant Simulation prior 2302.0007 SPP File null pointer dereference (ssa-017796)", "creation_timestamp": "2024-03-04T08:11:43.000000Z"}, {"uuid": "93561da1-8bf4-4708-8d6c-64c6e889b15c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23809", "type": "seen", "source": "https://t.me/ctinow/188753", "content": "https://ift.tt/2pI7MuP\nCVE-2024-23809", "creation_timestamp": "2024-02-20T17:25:36.000000Z"}, {"uuid": "7c813e5d-ed0a-441e-8c65-e074e9e40cd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23804", "type": "seen", "source": "https://t.me/ctinow/183712", "content": "https://ift.tt/jIevXQ5\nCVE-2024-23804", "creation_timestamp": "2024-02-13T10:22:14.000000Z"}, {"uuid": "24b9b9f8-a46f-4647-a3d3-84a83804e149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23803", "type": "seen", "source": "https://t.me/ctinow/183711", "content": "https://ift.tt/7K9zpBk\nCVE-2024-23803", "creation_timestamp": "2024-02-13T10:22:13.000000Z"}, {"uuid": "cded22d0-4a76-49ab-b7be-7bdbfc71301f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23802", "type": "seen", "source": "https://t.me/ctinow/183710", "content": "https://ift.tt/OwteacF\nCVE-2024-23802", "creation_timestamp": "2024-02-13T10:22:12.000000Z"}, {"uuid": "45e8453c-3970-48f5-97f9-bc071d25e814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23801", "type": "seen", "source": "https://t.me/ctinow/183709", "content": "https://ift.tt/BtHqhO7\nCVE-2024-23801", "creation_timestamp": "2024-02-13T10:22:11.000000Z"}, {"uuid": "ca408ee1-0cfb-4421-806f-3baa832defe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-23800", "type": "seen", "source": "https://t.me/ctinow/183708", "content": "https://ift.tt/pb2k1SJ\nCVE-2024-23800", "creation_timestamp": "2024-02-13T10:22:10.000000Z"}]}