{"vulnerability": "cve-2024-3936", "sightings": [{"uuid": "36832444-a994-462f-8abb-7baf541a8821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39364", "type": "seen", "source": "https://t.me/cvedetector/6568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39364 - Advantech ADAM-5630 Unauthenticated Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2024-39364 \nPublished : Sept. 27, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : Advantech ADAM-5630   \nhas built-in commands that can be executed without authenticating the   \nuser. These commands allow for restarting the operating system,   \nrebooting the hardware, and stopping the execution. The commands can be   \nsent to a simple HTTP request and are executed by the device   \nautomatically, without discrimination of origin or level of privileges   \nof the user sending the commands. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T20:55:15.000000Z"}, {"uuid": "826b634b-1d76-42d8-a83b-335d2be7ec88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39363", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1495", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39363\n\ud83d\udd39 Description: A cross-site scripting (xss) vulnerability exists in the login.cgi set_lang_CountryCode() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2025-01-14T14:21:36.160Z\n\ud83d\udccf Modified: 2025-01-14T14:58:32.916Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2024-2017", "creation_timestamp": "2025-01-14T15:11:44.000000Z"}, {"uuid": "1d5fe933-9b30-4ce6-89c7-d6019750eedc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39368", "type": "seen", "source": "https://t.me/cvedetector/10894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39368 - Intel(R) Neural Compressor SQL Injection Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-39368 \nPublished : Nov. 13, 2024, 9:15 p.m. | 41\u00a0minutes ago \nDescription : Improper neutralization of special elements used in an SQL command ('SQL Injection') in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:05:55.000000Z"}, {"uuid": "93a43120-78c2-4fce-9c5c-72443d22866d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39368", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478650400443871", "content": "", "creation_timestamp": "2024-11-14T01:13:10.301879Z"}, {"uuid": "fccd0ff3-0e39-4ab1-9fda-a38ba0feb37d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39363", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkapuyx52j", "content": "", "creation_timestamp": "2025-01-14T15:16:59.572990Z"}, {"uuid": "be175951-c9ee-4b6a-bb5f-a636036ed7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39367", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkaswmwf2t", "content": "", "creation_timestamp": "2025-01-14T15:17:02.790043Z"}, {"uuid": "99ba52bc-12aa-4905-a357-845f24307c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39365", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7chemax2i", "content": "", "creation_timestamp": "2025-02-12T22:18:07.130767Z"}, {"uuid": "ce19bf35-14f2-4426-8651-1050e8d49593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993685217356897", "content": "", "creation_timestamp": "2025-02-13T00:13:17.709902Z"}, {"uuid": "07f1de39-31b0-4489-b5b5-9a4aedcc477d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39360", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkamturv2f", "content": "", "creation_timestamp": "2025-01-14T15:16:56.390329Z"}]}