{"vulnerability": "cve-2024-3626", "sightings": [{"uuid": "f29254ff-8e47-445b-8a2f-f2b557c24ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "seen", "source": "https://t.me/cvedetector/2340", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36268 - Apache InLong Remote Code Execution (Code Injection)\", \n  \"Content\": \"CVE ID : CVE-2024-36268 \nPublished : Aug. 2, 2024, 10:16 a.m. | 36\u00a0minutes ago \nDescription : Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.  \n  \nThis issue affects Apache InLong: from 1.10.0 through 1.12.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.13.0 or cherry-pick [1] to solve it.  \n  \n[1]\u00a0  \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-02T13:11:07.000000Z"}, {"uuid": "698fd9d1-b869-4caf-9ffc-4a6200a8ad7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "seen", "source": "https://t.me/CyberBulletin/259", "content": "\u26a1CVE-2024-36268: Apache InLong Vulnerability Leaves Systems Open to Remote Attacks.\n\n#CyberBulletin", "creation_timestamp": "2024-08-05T09:21:26.000000Z"}, {"uuid": "fe04e97f-3764-4d00-a243-283c0df624b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "seen", "source": "https://t.me/GrayHatsHack/8484", "content": "\u26a1CVE-2024-36268: Apache InLong Vulnerability Leaves Systems Open to Remote Attacks.\n\n#CyberBulletin", "creation_timestamp": "2024-08-05T09:33:27.000000Z"}, {"uuid": "b734f5a7-3403-41e2-ba4f-c811214a1e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "seen", "source": "https://t.me/dilagrafie/3617", "content": "\u26a1CVE-2024-36268: Apache InLong Vulnerability Leaves Systems Open to Remote Attacks.\n\n#CyberBulletin", "creation_timestamp": "2024-08-05T12:25:20.000000Z"}, {"uuid": "2a3a261a-6289-4a06-a3ac-a2cc84b9eafd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "seen", "source": "https://t.me/GrayHatsHack/7171", "content": "\u26a1CVE-2024-36268: Apache InLong Vulnerability Leaves Systems Open to Remote Attacks.\n\n#CyberBulletin", "creation_timestamp": "2024-08-05T09:33:27.000000Z"}, {"uuid": "65b03ed7-e75b-4015-802a-233158bd7850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36264", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8263", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36264\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine Commons Utils.\n\nIf the user doesn't explicitly set `submarine.auth.default.secret`, a default value will be used.\n\n\nThis issue affects Apache Submarine Commons Utils: from 0.8.0.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2024-06-12T14:06:31.545Z\n\ud83d\udccf Modified: 2025-03-20T19:07:12.124Z\n\ud83d\udd17 References:\n1. https://github.com/apache/submarine/pull/1125\n2. https://lists.apache.org/thread/7mo0c7vbhpo8thvybl8wwvb0bccrg7r4", "creation_timestamp": "2025-03-20T19:18:23.000000Z"}, {"uuid": "946b7020-ad4d-462b-92b0-ad1dd8bab785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36268", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/8679", "content": "\u200aCVE-2024-36268: Apache InLong Vulnerability Leaves Systems Open to Remote Attacks\n\nhttps://securityonline.info/cve-2024-36268-apache-inlong-vulnerability-leaves-systems-open-to-remote-attacks/", "creation_timestamp": "2024-08-05T11:10:43.000000Z"}, {"uuid": "41f3b1ba-3830-45e4-a767-8e9b4de7f1df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36261", "type": "seen", "source": "https://t.me/cvedetector/5736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36261 - Intel RAID Web Console DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-36261 \nPublished : Sept. 16, 2024, 5:16 p.m. | 14\u00a0minutes ago \nDescription : Improper access control in Intel(R) RAID Web Console software all versions may allow an authenticated user to potentially enable denial of service via adjacent access. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T19:32:23.000000Z"}, {"uuid": "97f940b9-4ab8-4c89-9521-781b97b5852f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36262", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7azwrzt2g", "content": "", "creation_timestamp": "2025-02-12T22:17:19.536903Z"}, {"uuid": "c3ebd2cd-b987-4ae1-8c20-0991a6209cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36262", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993448977390210", "content": "", "creation_timestamp": "2025-02-12T23:13:12.938962Z"}]}