{"vulnerability": "cve-2024-5324", "sightings": [{"uuid": "434c69ba-7e65-438a-8658-c279ed774597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrblz4zh6c2e", "content": "", "creation_timestamp": "2025-06-10T19:13:37.860980Z"}, {"uuid": "09f60d3c-97f1-4ab3-beae-05d830f654ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://bsky.app/profile/mitstek.bsky.social/post/3lndfjb577k2u", "content": "", "creation_timestamp": "2025-04-21T14:41:53.572107Z"}, {"uuid": "ee7e67a5-4d77-4ac4-8942-51e74bcaa31b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53240", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "af7d5a02-656a-4559-bc23-407d79ac11a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "f8c6e51e-eeed-442a-9b14-40f2594adf82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53247", "type": "seen", "source": "https://t.me/CyberBulletin/1736", "content": "\u26a1\ufe0fCVE-2024-53247: Splunk Secure Gateway App Vulnerability Allows Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2024-12-12T08:17:54.000000Z"}, {"uuid": "91c62a2a-2c14-427e-b282-62f85db8b10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53242", "type": "seen", "source": "https://t.me/cvedetector/12506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53242 - \"Siemens Teamcenter/Tecnomatix_Rendering Out-of-Bounds Read Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-53242 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.14), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.12), Teamcenter Visualization V2312 (All versions &lt; V2312.0008), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0016), Tecnomatix Plant Simulation V2404 (All versions &lt; V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.  \nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206) \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:15.000000Z"}, {"uuid": "47244f0b-a808-4b15-bbfd-702777eb21a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53243", "type": "seen", "source": "https://t.me/cvedetector/12531", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53243 - Splunk Enterprise and Splunk Secure Gateway App Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-53243 \nPublished : Dec. 10, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:59:11.000000Z"}, {"uuid": "fd33beb4-d05a-4b3a-8de8-03b77eec4182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53247", "type": "seen", "source": "https://t.me/cvedetector/12530", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53247 - Splunk Enterprise Stored Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53247 \nPublished : Dec. 10, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.2.461 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could perform a Remote Code Execution (RCE). \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:59:10.000000Z"}, {"uuid": "eeaf9923-f666-4051-bab7-4b15a0fefe5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53243", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113629897738815588", "content": "", "creation_timestamp": "2024-12-10T18:17:21.415259Z"}, {"uuid": "e05e760a-a0dd-4f69-b534-a6a2c283a802", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53244", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113629897738815588", "content": "", "creation_timestamp": "2024-12-10T18:17:21.458014Z"}, {"uuid": "40aafa31-c0a0-4845-a23b-acb975649a59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53245", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113629897738815588", "content": "", "creation_timestamp": "2024-12-10T18:17:21.495676Z"}, {"uuid": "ac3e2941-1adf-4ea4-95e9-e38a1f957531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53246", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113629897738815588", "content": "", "creation_timestamp": "2024-12-10T18:17:21.528856Z"}, {"uuid": "4051ec73-596f-4814-bb36-6a0147027f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53247", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113629897738815588", "content": "", "creation_timestamp": "2024-12-10T18:17:21.557173Z"}, {"uuid": "239dd599-71d7-473c-ba15-19d1b25b65d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lext6lx3ct27", "content": "", "creation_timestamp": "2025-01-05T04:53:00.604335Z"}, {"uuid": "da490837-4f63-4f4e-8f6b-e8e0d597d9cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53245", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "6436aa56-2147-4ff6-8125-204e12c6a2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "c4f495ed-9caf-415a-9d29-0633be75d73a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-53240", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "12b30805-666c-438f-a0b5-279f0bf6ce43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "5410faba-450c-4166-9e10-cba22b75843d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/122", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-w2vx-fp9q-36ph\n\ud83d\udd17 Aliases: CVE-2024-53241\n\ud83d\udd39 Details: In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don't do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.\n\ud83d\uddd3\ufe0f Modified: 2025-01-05T09:30:42Z\n\ud83d\uddd3\ufe0f Published: 2024-12-24T12:30:42Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-53241\n2. https://git.kernel.org/stable/c/05df6e6cd9a6b8aee33c3c18c9f3b3566d4a5\n3. https://git.kernel.org/stable/c/82c211ead1ec440dbf812e1b03b5e3c44b93d\n4. https://git.kernel.org/stable/c/a296dff62d6c6bfc5fbebdf2bee0d5ac0438906\n5. https://git.kernel.org/stable/c/cb4cfa6213a44fa4814186dfdf12502d036e3\n6. https://git.kernel.org/stable/c/fc3fdad0a44062d566aae3289d490de02d30\n7. https://git.kernel.org/stable/c/fa1985f613fed94a9da055b13ca51214c694f\n8. http://www.openwall.com/lists/oss-security/2024/12/1/2\n9. http://www.openwall.com/lists/oss-security/2024/12/23/1\n10. http://www.openwall.com/lists/oss-security/2025/01/05/1\n11. http://www.openwall.com/lists/oss-security/2025/01/05/2\n12. http://xenbits.xen.org/xsa/advisory-466.html", "creation_timestamp": "2025-01-05T09:36:21.000000Z"}, {"uuid": "fd9288fd-75e3-4029-aaa0-94acc6001d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53245", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5885", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53245\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.1.2312.206, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles, that has a username with the same name as a role with read access to dashboards, could see the dashboard name and the dashboard XML by cloning the dashboard.\n\ud83d\udccf Published: 2024-12-10T18:00:33.254Z\n\ud83d\udccf Modified: 2025-02-28T11:03:55.614Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2024-1203", "creation_timestamp": "2025-02-28T11:26:25.000000Z"}, {"uuid": "6a4644d7-8d99-4ce8-bf25-badcb049ab2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53246", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53246\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.\n\ud83d\udccf Published: 2024-12-10T18:01:16.803Z\n\ud83d\udccf Modified: 2025-02-28T11:03:55.865Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2024-1204", "creation_timestamp": "2025-02-28T11:26:24.000000Z"}, {"uuid": "6ded2d06-0efa-43d1-a52f-b4280f4d7e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53242", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-058/", "content": "", "creation_timestamp": "2025-01-22T05:00:00.000000Z"}, {"uuid": "40ef6db2-bd86-4215-9707-9c55e2d78e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53245", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:37.000000Z"}, {"uuid": "99a1d16d-3e86-465f-9ab0-aa72e2627834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53249", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcz2lsusnn2r", "content": "", "creation_timestamp": "2026-01-22T11:14:06.582064Z"}, {"uuid": "9015f920-3a0e-4504-926b-da478767dd2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcz2pntbrj2c", "content": "", "creation_timestamp": "2026-01-22T11:16:15.641020Z"}, {"uuid": "638e66d2-5963-4cc5-a1cb-54e9c77ab28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53247", "type": "seen", "source": "https://t.me/ics_cert/983", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 Splunk Secure Gateway Device Enrollment and Mobile App Deployment \u0627\u0628\u0632\u0627\u0631 \u067e\u0644\u062a \u0641\u0631\u0645 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc Splunk Enterprise \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0646\u0642\u0635 \u062f\u0631 \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645 deserialization \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0622\u067e\u0644\u0648\u062f \u06cc\u06a9 \u0641\u0627\u06cc\u0644 JSON \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u0648\u06cc\u0698\u0647 \u067e\u0631\u062f\u0627\u0632\u0634 \u0634\u062f\u0647 \u062a\u0648\u0633\u0637 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 jsonpickle python \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2024-11055\nCVE-2024-53247\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\n \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u0627\u0628\u0632\u0627\u0631 Splunk Secure Gateway.\n- \u0645\u062d\u062f\u0648\u062f\u06cc\u062a \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u0639\u0645\u0648\u0645\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a) \u0628\u0647 \u067e\u0644\u062a \u0641\u0631\u0645\u061b\n- \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646/\u062d\u0630\u0641 \u062d\u0633\u0627\u0628 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0634\u062f\u0647\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u062f\u0631 \u0633\u0637\u062d \u0628\u0631\u0646\u0627\u0645\u0647 \u0648\u0628 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://advisory.splunk.com/advisories/SVD-2024-1205\n\u26a0\ufe0f\u0628\u06cc\u0627\u0646\u06cc\u0647 \u0633\u0644\u0628 \u0645\u0633\u0626\u0648\u0644\u06cc\u062a\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2024-12-27T20:36:34.000000Z"}, {"uuid": "c6c8ae88-f381-4e11-9769-0b0007b81fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53240", "type": "seen", "source": "https://t.me/cvedetector/13578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53240 - Xen Netfront Device Uninitialized Queue Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53240 \nPublished : Dec. 24, 2024, 10:15 a.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nxen/netfront: fix crash when removing device  \n  \nWhen removing a netfront device directly after a suspend/resume cycle  \nit might happen that the queues have not been setup again, causing a  \ncrash during the attempt to stop the queues another time.  \n  \nFix that by checking the queues are existing before trying to stop  \nthem.  \n  \nThis is XSA-465 / CVE-2024-53240. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T11:53:41.000000Z"}, {"uuid": "d0440ad4-5c52-4b83-8dc1-ddf495f2fa95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://t.me/cvedetector/13576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53241 - Xen Linux x86 Xen Hyper-Call&gt;(); Type: Hyper-Call\", \n  \"Content\": \"CVE ID : CVE-2024-53241 \nPublished : Dec. 24, 2024, 10:15 a.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nx86/xen: don't do PV iret hypercall through hypercall page  \n  \nInstead of jumping to the Xen hypercall page for doing the iret  \nhypercall, directly code the required sequence in xen-asm.S.  \n  \nThis is done in preparation of no longer using hypercall page at all,  \nas it has shown to cause problems with speculation mitigations.  \n  \nThis is part of XSA-466 / CVE-2024-53241. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T11:53:39.000000Z"}, {"uuid": "9e0c96f5-4aec-48a1-9826-74decb93e94c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53246", "type": "seen", "source": "https://t.me/cvedetector/12534", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53246 - Splunk Enterprise Unauthenticated Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53246 \nPublished : Dec. 10, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:59:16.000000Z"}, {"uuid": "8d4fea84-c542-4974-a62a-c84bcf08d919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53245", "type": "seen", "source": "https://t.me/cvedetector/12533", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53245 - Splunk Enterprise Dashboard Cloning Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-53245 \nPublished : Dec. 10, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.1.2312.206, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles, that has a username with the same name as a role with read access to dashboards, could see the dashboard name and the dashboard XML by cloning the dashboard. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:59:12.000000Z"}, {"uuid": "ed42809f-0d82-4ee0-b065-4431346a969e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53244", "type": "seen", "source": "https://t.me/cvedetector/12532", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53244 - Splunk Enterprise and Splunk Cloud Platform Phishing-Enabled Cross-Site Request Forgery (CSRF) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53244 \nPublished : Dec. 10, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.2.2406.107, 9.2.2403.109, and 9.1.2312.206, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands on \u201c/en-US/app/search/report\u201c endpoint through \u201cs\u201c parameter.\nThe vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T19:59:11.000000Z"}, {"uuid": "45f1c8d1-74e3-4d50-a5a3-269684d369b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53247", "type": "seen", "source": "https://t.me/CyberBulletin/26765", "content": "\u26a1\ufe0fCVE-2024-53247: Splunk Secure Gateway App Vulnerability Allows Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2024-12-12T08:17:54.000000Z"}, {"uuid": "e13a3341-6e72-43f9-970c-38f95e210fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53242", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-09", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "6948779e-8fba-4a0f-ae5a-c7cd63ad70da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53240", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707151066709654", "content": "", "creation_timestamp": "2024-12-24T09:43:53.612327Z"}, {"uuid": "ee5d4588-1dd5-4626-96df-3ecc73263e97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707151082355360", "content": "", "creation_timestamp": "2024-12-24T09:43:53.963510Z"}, {"uuid": "c2586640-d2c5-479e-bf97-e55fa3f1126d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53240", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le27mjouda2e", "content": "", "creation_timestamp": "2024-12-24T10:15:38.368686Z"}, {"uuid": "6e9b471a-158c-4196-b243-26d4f4531e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53241", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le27mmbjti2e", "content": "", "creation_timestamp": "2024-12-24T10:15:41.159195Z"}]}