{"vulnerability": "cve-2024-3194", "sightings": [{"uuid": "d5781a48-8c7d-434e-b3ae-d065d5310885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31947", "type": "seen", "source": "https://t.me/cvedetector/788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31947 - StoneFly Storage Concentrator (SC and SCVM) before\", \n  \"Content\": \"CVE ID : CVE-2024-31947 \nPublished : July 12, 2024, 11:15 p.m. | 41\u00a0minutes ago \nDescription : StoneFly Storage Concentrator (SC and SCVM) before 8.0.4.26 allows Directory Traversal by authenticated users. Using a crafted path parameter with the Online Help facility can expose sensitive system information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-13T02:08:11.000000Z"}, {"uuid": "2336db66-f92a-49a3-8fbc-8932a2aaacec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31946", "type": "seen", "source": "https://t.me/cvedetector/899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31946 - Stormshield Network Security Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31946 \nPublished : July 15, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T21:52:16.000000Z"}, {"uuid": "308c687c-a052-4716-8dac-20ffb7361734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31949", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7422", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31949\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In FRRouting (FRR) through 9.1, an infinite loop can occur when receiving a MP/GR capability as a dynamic capability because malformed data results in a pointer not advancing.\n\ud83d\udccf Published: 2024-04-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T16:34:33.179Z\n\ud83d\udd17 References:\n1. https://github.com/FRRouting/frr/pull/15640\n2. https://github.com/FRRouting/frr/pull/15640/commits/30a332dad86fafd2b0b6c61d23de59ed969a219b\n3. https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html", "creation_timestamp": "2025-03-13T16:45:16.000000Z"}]}