{"vulnerability": "cve-2024-5113", "sightings": [{"uuid": "696de295-bf5f-4ff3-adb7-51691e38f1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083241199567069", "content": "", "creation_timestamp": "2025-02-28T19:49:09.667612Z"}, {"uuid": "cf2c7f09-0a45-4c36-8e3a-820a553dd5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114084184639914320", "content": "", "creation_timestamp": "2025-02-28T23:48:37.719985Z"}, {"uuid": "28e1955f-082e-4a9d-aa9c-c8b52c2df9ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.106543Z"}, {"uuid": "449635dc-9aad-4e7a-8f47-94cbd53b62b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.224307Z"}, {"uuid": "e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5113", "type": "seen", "source": "Telegram/OE92hMtDo0Ldfy3Zq_SV2j3A7EyX_CyNZtR1RN6FwvoL06zp", "content": "", "creation_timestamp": "2025-02-21T22:10:27.000000Z"}, {"uuid": "35fdba15-ea27-4d94-92db-80a2220f3a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://t.me/cvedetector/19073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51139 - Netgear Vigor Router Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51139 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:46.000000Z"}, {"uuid": "cc16800b-ea5a-4831-a280-2191e9856852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://t.me/cvedetector/19072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51138 - TP-Link Vigor TR069 STUN Server Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51138 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:45.000000Z"}, {"uuid": "5fc09861-61a7-4b5a-acee-31f066882876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51135", "type": "seen", "source": "https://t.me/cvedetector/10518", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51135 - Powertac Server XML External Entity Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51135 \nPublished : Nov. 11, 2024, 7:15 p.m. | 37\u00a0minutes ago \nDescription : An XML External Entity (XXE) vulnerability in the component DocumentBuilderFactory of powertac-server v1.9.0 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted request containing malicious XML entities. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T21:07:23.000000Z"}, {"uuid": "8bfc3139-5052-4aa1-895a-a01f781f4e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51136", "type": "seen", "source": "https://t.me/cvedetector/9768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51136 - Openimaj Dmoz2CSV XXE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51136 \nPublished : Nov. 4, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1.3.10 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted XML file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T18:37:41.000000Z"}, {"uuid": "ac515270-5939-4a43-884e-655d96036823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "Telegram/a-KbHMaydG4wvUw-hFKaFz8PP4CLd7hDJTIYGL0kr7XOvzZv", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}, {"uuid": "00c7a919-c817-4684-ba2f-7c087b765f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51135", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113465833689749846", "content": "", "creation_timestamp": "2024-11-11T18:53:42.661397Z"}, {"uuid": "f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51139\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:23:14.780Z\n\ud83d\udd17 References:\n1. http://draytek.com\n2. https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", "creation_timestamp": "2025-02-28T17:27:05.000000Z"}, {"uuid": "ddf94560-15fe-49dd-8c2e-b773f3ed1050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51132", "type": "seen", "source": "https://t.me/cvedetector/9898", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51132 - \"Apache HAPI FHIR XML External Entity Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-51132 \nPublished : Nov. 5, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : An XML External Entity (XXE) vulnerability in HAPI FHIR before v6.4.0 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted request containing malicious XML entities. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T18:53:45.000000Z"}, {"uuid": "4acb1328-dcd4-4a71-bc43-ca51c87706bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "8d2beee0-2b4c-4684-8f08-21c6d69f0f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51132", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431402794632191", "content": "", "creation_timestamp": "2024-11-05T16:57:29.330202Z"}]}