{"vulnerability": "cve-2024-3370", "sightings": [{"uuid": "5b68a44d-c6d2-449c-bbd3-d0939a4980e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33700", "type": "seen", "source": "https://t.me/cvedetector/9426", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33700 - LevelOne WBR-6012 FTP Command Injection Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-33700 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router firmware R0.40e6 suffers from an input validation vulnerability within its FTP functionality, enabling attackers to cause a denial of service through a series of malformed FTP commands. This can lead to device reboots and service disruption. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:51:57.000000Z"}, {"uuid": "a5637552-ac82-4d86-a1d2-8bfd992b890e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3370", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504110989877358", "content": "", "creation_timestamp": "2024-11-18T13:08:07.808319Z"}, {"uuid": "dcff0e00-c0fb-454a-8e43-9c552dd77e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3370", "type": "seen", "source": "https://t.me/cvedetector/11334", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3370 - Egebilgi Software Website Template SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-3370 \nPublished : Nov. 18, 2024, 1:15 p.m. | 32\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Egebilgi Software Website Template allows SQL Injection.This issue affects Website Template: before 29.04.2024. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T14:52:43.000000Z"}]}