{"vulnerability": "cve-2024-4339", "sightings": [{"uuid": "28909243-69d2-4e03-b55f-974a3dd3111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/androidMalware/2321", "content": "Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF) could allow malicious actors to execute code remotely on servers running MobSF (CVE-2024-43399)\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf", "creation_timestamp": "2025-03-25T15:55:29.000000Z"}, {"uuid": "8330472b-3c51-4e8d-8166-834632c82305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43394", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114830011674092966", "content": "", "creation_timestamp": "2025-07-10T17:02:07.380881Z"}, {"uuid": "620f2bc3-986e-459c-a026-31d109ec7f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43394", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ltmw7wpwuw2o", "content": "", "creation_timestamp": "2025-07-10T18:06:01.804119Z"}, {"uuid": "79c4eb45-4bb8-42f4-9565-17c862b417bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43395", "type": "seen", "source": "https://t.me/cvedetector/3375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43395 - CraftOS-PC Code Execution and Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43395 \nPublished : Aug. 16, 2024, 9:15 p.m. | 26\u00a0minutes ago \nDescription : CraftOS-PC 2 is a rewrite of the desktop port of CraftOS from the popular Minecraft mod ComputerCraft using C++ and a modified version of PUC Lua, as well as SDL for drawing. Prior to version 2.8.3, users of CraftOS-PC 2 on Windows can escape the computer folder and access files anywhere without permission or notice by obfuscating `..`s to bypass the internal check preventing parent directory traversal. Version 2.8.3 contains a patch for this issue. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T23:45:35.000000Z"}, {"uuid": "cb679577-8bac-4484-a474-c780d8f9d86e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43397", "type": "seen", "source": "https://t.me/cvedetector/3649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43397 - Apollo Configuration Management System Unauthorized Namespace Modification\", \n  \"Content\": \"CVE ID : CVE-2024-43397 \nPublished : Aug. 20, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T17:58:17.000000Z"}, {"uuid": "ebf7210a-dbcd-4da5-8394-2cf588d37a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43394", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/23", "content": "", "creation_timestamp": "2025-07-10T15:42:59.000000Z"}, {"uuid": "e6b165ec-9b61-400d-85c3-d7bb946bed1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43394", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3ltnpxyrxfk2s", "content": "", "creation_timestamp": "2025-07-11T01:46:55.846873Z"}, {"uuid": "5470ba95-a381-46e9-bbdd-1a0e4e5334a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/cvedetector/3516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43399 - \"MobSF Unvalidated .a Extension File Extraction\"\", \n  \"Content\": \"CVE ID : CVE-2024-43399 \nPublished : Aug. 19, 2024, 3:15 p.m. | 26\u00a0minutes ago \nDescription : Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T17:41:43.000000Z"}, {"uuid": "574b29ab-4c8d-4cab-a871-c3173b3a4058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43390", "type": "seen", "source": "https://t.me/cvedetector/5193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43390 - F5 Networks Firewall Environment Variable Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43390 \nPublished : Sept. 10, 2024, 9:15 a.m. | 17\u00a0minutes ago \nDescription : A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT through the FW_NAT.IN_IP environment variable which can lead to a DoS. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T11:43:16.000000Z"}, {"uuid": "fe7ce0b5-062a-42bb-84c2-5647f17d37f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43391", "type": "seen", "source": "https://t.me/cvedetector/5191", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43391 - Fortinet FireWall Rules Configuration Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43391 \nPublished : Sept. 10, 2024, 9:15 a.m. | 17\u00a0minutes ago \nDescription : A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT\u00a0through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T11:43:14.000000Z"}, {"uuid": "a3bab548-9f05-48f6-a82f-f8198004d6bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43393", "type": "seen", "source": "https://t.me/cvedetector/5190", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43393 - Fortinet Firewall Elevated Configuration Change Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43393 \nPublished : Sept. 10, 2024, 9:15 a.m. | 17\u00a0minutes ago \nDescription : A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP  environment variable which can lead to a DoS. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T11:43:10.000000Z"}, {"uuid": "addb12cc-a751-4a14-9f28-07ca88d2b477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43398", "type": "seen", "source": "https://t.me/cvedetector/3915", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43398 - Oracle REXML XML Toolkit Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43398 \nPublished : Aug. 22, 2024, 3:15 p.m. | 18\u00a0minutes ago \nDescription : REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T17:42:28.000000Z"}, {"uuid": "d8f1db2b-80b4-4edb-b7c7-0e984b2d77b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43396", "type": "seen", "source": "https://t.me/cvedetector/3688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43396 - Khoj Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43396 \nPublished : Aug. 20, 2024, 9:15 p.m. | 31\u00a0minutes ago \nDescription : Khoj is an application that creates personal AI agents. The Automation feature allows a user to insert arbitrary HTML inside the task instructions, resulting in a Stored XSS. The q parameter for the /api/automation endpoint does not get correctly sanitized when rendered on the page, resulting in the ability of users to inject arbitrary HTML/JS. This vulnerability is fixed in 1.15.0. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T23:49:38.000000Z"}, {"uuid": "d47cd29b-b3ca-4dee-bc93-7597a2345f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43398", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lnsqohewgt2x", "content": "", "creation_timestamp": "2025-04-27T17:11:35.374408Z"}, {"uuid": "fe8e38e5-281c-4f89-af5a-d655e1d8baea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43392", "type": "seen", "source": "https://t.me/cvedetector/5188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43392 - Citrix NetScaler Firewall Environment Variable Injection\", \n  \"Content\": \"CVE ID : CVE-2024-43392 \nPublished : Sept. 10, 2024, 9:15 a.m. | 17\u00a0minutes ago \nDescription : A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the\u00a0FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP  environment variable which can lead to a DoS. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T11:43:09.000000Z"}, {"uuid": "11933c95-23d4-49e3-a5ae-7b2ce5678731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43399", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11348", "content": "\u200aCVE-2024-43399: Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF)\n\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf/", "creation_timestamp": "2024-08-26T16:57:49.000000Z"}]}