{"vulnerability": "CVE-2024-38475", "sightings": [{"uuid": "4a837fca-ce0c-4fdb-876c-6a610c1c52c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113600185597148773", "content": "", "creation_timestamp": "2024-12-05T12:21:10.170460Z"}, {"uuid": "9c718174-0408-439c-a983-399ca5865642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lo4ovf3wwe2f", "content": "", "creation_timestamp": "2025-05-01T16:06:49.294350Z"}, {"uuid": "54b3fc59-7248-48e5-86a4-65dcd35425a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427816217281348", "content": "", "creation_timestamp": "2025-04-30T16:18:31.188960Z"}, {"uuid": "c0a6da05-bce3-4dc7-8123-a89b3de44163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lo3tcsogtk2x", "content": "", "creation_timestamp": "2025-05-01T07:52:44.174575Z"}, {"uuid": "88605908-4085-4154-9dde-f1f21e274cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lo3wrdtnnl2n", "content": "", "creation_timestamp": "2025-05-01T08:54:34.234931Z"}, {"uuid": "5c1ad812-5973-4f0d-bd98-98b4ef8b3606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/ethicalhack3r.bsky.social/post/3lo3xy6xtds26", "content": "", "creation_timestamp": "2025-05-01T09:16:23.079846Z"}, {"uuid": "26751107-9b87-49f7-bdca-adaf257244c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lo4vbm4mv32r", "content": "", "creation_timestamp": "2025-05-01T18:00:30.950591Z"}, {"uuid": "1e3c32b4-04a0-4095-9426-bc67ecec4d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3921825", "content": "", "creation_timestamp": "2025-05-01T18:55:11.572619Z"}, {"uuid": "8406daa5-c1c8-4753-b005-241a232e08b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lo4yvh66xc2b", "content": "", "creation_timestamp": "2025-05-01T19:05:17.763453Z"}, {"uuid": "c3b457fd-af56-4111-a5a1-c54224e0e184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lo52jdiw7l2l", "content": "", "creation_timestamp": "2025-05-01T19:34:18.573332Z"}, {"uuid": "4d2caa6d-8b97-46de-b713-aa396aa80f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo57i2hvlx2k", "content": "", "creation_timestamp": "2025-05-01T21:03:06.936907Z"}, {"uuid": "41844d03-78cd-4417-858e-defebfb3595f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/aimainainnu.bsky.social/post/3lo5jzqmyo22w", "content": "", "creation_timestamp": "2025-05-02T00:11:59.663412Z"}, {"uuid": "b4dba69a-5ef1-4762-a17b-a9753e1a2f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lo5qxmlr7g2c", "content": "", "creation_timestamp": "2025-05-02T02:16:00.264435Z"}, {"uuid": "513e7407-7283-4fe7-be94-43dba86e0c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38475", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114438226069132486", "content": "", "creation_timestamp": "2025-05-02T12:25:52.824236Z"}, {"uuid": "7b232fd6-5ebd-4bed-803c-889719c36552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lo72yob63vr2", "content": "", "creation_timestamp": "2025-05-02T14:49:02.263440Z"}, {"uuid": "d9043f7b-00f5-4990-ad3c-71bad430928b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-38475.yaml", "content": "", "creation_timestamp": "2025-05-02T00:18:34.000000Z"}, {"uuid": "8adf0a5d-0eae-4942-ae36-c862903b981e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo7f5s5lnj2t", "content": "", "creation_timestamp": "2025-05-02T17:50:01.660021Z"}, {"uuid": "20aa34f0-986a-4738-a891-5cb2936f347b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo7f5sb2zm2x", "content": "", "creation_timestamp": "2025-05-02T17:50:02.296288Z"}, {"uuid": "d353e595-e7a5-4efe-8899-3bcf5abb6b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo7pvrd6ws2j", "content": "", "creation_timestamp": "2025-05-02T21:02:25.569326Z"}, {"uuid": "4aef57df-b6f5-4a66-99eb-12de6b59bde1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lo7xqrxfpk23", "content": "", "creation_timestamp": "2025-05-02T23:22:48.476590Z"}, {"uuid": "0331f831-5951-4f17-aed5-5eb3450a1d3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lo7yhvsn5223", "content": "", "creation_timestamp": "2025-05-02T23:35:42.683928Z"}, {"uuid": "3afdd628-c353-4cf3-ae98-e971c86170b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lo5utzjshk2d", "content": "", "creation_timestamp": "2025-05-02T03:25:34.840120Z"}, {"uuid": "6d3e5b2f-6859-4a79-969e-0c0be8d3076b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3loabdgvsvm23", "content": "", "creation_timestamp": "2025-05-03T02:14:16.093915Z"}, {"uuid": "16039af6-abbd-4abd-9868-49ae30df4b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3logblv4pttz2", "content": "", "creation_timestamp": "2025-05-05T11:35:25.317071Z"}, {"uuid": "a1a769ec-53dd-4037-adbc-b9f709045b3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://threatintel.cc/2025/05/02/sonicboom-from-stolen-tokens-to.html", "content": "", "creation_timestamp": "2025-05-03T01:37:21.000000Z"}, {"uuid": "a1f4cfbd-dd98-471b-b901-e66edffba691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lodsabata22i", "content": "", "creation_timestamp": "2025-05-04T11:54:42.690939Z"}, {"uuid": "3f5bfa57-bbbc-47e7-935c-72d463cab2da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lodvpz73fc2v", "content": "", "creation_timestamp": "2025-05-04T12:57:16.256059Z"}, {"uuid": "de0fb094-9aba-43c8-a7f8-04a503d9bbf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lofiroy6a62d", "content": "", "creation_timestamp": "2025-05-05T04:10:49.380355Z"}, {"uuid": "dd595cfe-9b13-4e92-8102-717ebd518824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38475", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lofs4tu4n22p", "content": "", "creation_timestamp": "2025-05-05T06:58:07.795015Z"}, {"uuid": "83fcf3c3-edc7-4dd5-9bc2-c1a6e9f349bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lofw3lfasc2x", "content": "", "creation_timestamp": "2025-05-05T08:08:59.465407Z"}, {"uuid": "df9c1d1d-c104-4181-aea7-45594b0d9a94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38475", "type": "seen", "source": "https://social.circl.lu/users/circl/statuses/114454382331852389", "content": "", "creation_timestamp": "2025-05-05T08:54:38.570214Z"}, {"uuid": "33f08a26-9e73-4158-bd3d-a7074ca849e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/mrtechking.bsky.social/post/3lobakj4wy72o", "content": "", "creation_timestamp": "2025-05-03T11:32:59.805079Z"}, {"uuid": "232b9f89-fb63-48d3-b0f6-a29b4ebcee6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lobakkbmja2k", "content": "", "creation_timestamp": "2025-05-03T11:33:00.641923Z"}, {"uuid": "79c86e40-bfa5-4d3e-bfc8-d56c34e5dc1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lobvlnxd5k2x", "content": "", "creation_timestamp": "2025-05-03T17:49:26.455435Z"}, {"uuid": "87fe8830-922b-452d-aff7-baaed9313ed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3locaehnqfe27", "content": "", "creation_timestamp": "2025-05-03T21:02:16.975209Z"}, {"uuid": "14d01d73-8246-4cdf-93ed-d415c1cc0f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3locbxpofrk2t", "content": "", "creation_timestamp": "2025-05-03T21:30:56.420562Z"}, {"uuid": "a5cf2e36-e697-4c5c-9303-ec99655316b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lod22tus5r2x", "content": "", "creation_timestamp": "2025-05-04T04:42:11.028694Z"}, {"uuid": "e1ce802c-35f0-41fd-bf19-c7539c059e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3logpyifbfs2k", "content": "", "creation_timestamp": "2025-05-05T15:52:33.115061Z"}, {"uuid": "b1102d00-22d9-4759-a5fc-a736458fd507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38475", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114456195353170083", "content": "", "creation_timestamp": "2025-05-05T16:35:42.308247Z"}, {"uuid": "7c255bba-94e5-4cb7-af42-48686dea65ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3logthu3uqc2c", "content": "", "creation_timestamp": "2025-05-05T16:54:52.424685Z"}, {"uuid": "5e6336e9-6fb2-491e-978b-512653a725a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lohdiklxjk2k", "content": "", "creation_timestamp": "2025-05-05T21:41:37.130739Z"}, {"uuid": "1c9f49c9-831c-4a9e-ad99-e3038228c6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3loiri6fivp2s", "content": "", "creation_timestamp": "2025-05-06T11:24:32.467186Z"}, {"uuid": "00a18041-c961-412e-aeb7-4922611ad034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3loiror55fy24", "content": "", "creation_timestamp": "2025-05-06T11:28:14.246044Z"}, {"uuid": "ece6ac4c-3885-4809-ba52-16f2e77b2cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114460728647818772", "content": "", "creation_timestamp": "2025-05-06T11:48:34.952612Z"}, {"uuid": "db277fe9-ed10-427f-9fdf-36d844aefb5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3loisthvekc2g", "content": "", "creation_timestamp": "2025-05-06T11:48:45.929230Z"}, {"uuid": "d990b2b5-7ac6-4dc5-b7d0-6786a195cacb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/acirema.dev/post/3lojc7ku3bc2g", "content": "", "creation_timestamp": "2025-05-06T16:23:59.049295Z"}, {"uuid": "090a29b7-8ecf-4403-bd5b-6a34fc47328f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lojd2vowlh2m", "content": "", "creation_timestamp": "2025-05-06T16:39:14.557483Z"}, {"uuid": "1ea00d6b-2aab-42a6-a264-79cba5a1e259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lojdzklkqs2c", "content": "", "creation_timestamp": "2025-05-06T16:56:25.146794Z"}, {"uuid": "73cb37c9-e869-40e8-97ff-d48ece363ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lohdv5i7bs2k", "content": "", "creation_timestamp": "2025-05-05T21:48:39.456071Z"}, {"uuid": "d18ba74c-d395-47f1-8ddc-db23ea22be45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lohsufhewa2g", "content": "", "creation_timestamp": "2025-05-06T02:16:36.486024Z"}, {"uuid": "aa19c2a3-02c6-4c5d-96a6-39278e90ab74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3loxbtzncu22r", "content": "", "creation_timestamp": "2025-05-12T05:54:47.081876Z"}, {"uuid": "3f59e360-8599-4716-b84b-5199d72d3219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lok2j4bcms2n", "content": "", "creation_timestamp": "2025-05-06T23:38:47.370360Z"}, {"uuid": "bac8ccd0-bd40-46f8-b750-110b2714676e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lok5h5xsvf24", "content": "", "creation_timestamp": "2025-05-07T00:31:23.567313Z"}, {"uuid": "1390fb19-1e9a-4486-af0c-d5ab17c6d1f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lokbxvy5df2t", "content": "", "creation_timestamp": "2025-05-07T01:52:20.175729Z"}, {"uuid": "01a99341-6a6f-401e-bbc8-c975bde0a25e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lokdekpiju2w", "content": "", "creation_timestamp": "2025-05-07T02:17:18.237573Z"}, {"uuid": "8457e4d1-364b-429e-8cd3-b39b0a505117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokqkue7osl2", "content": "", "creation_timestamp": "2025-05-07T06:19:43.791342Z"}, {"uuid": "8c190032-c83e-4188-a98c-13ba7b296565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwqx3zgl52", "content": "", "creation_timestamp": "2025-05-07T08:13:09.306119Z"}, {"uuid": "c523c1e9-1e1f-4d98-ba31-8c2e1d2f6594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lomtv2durb2w", "content": "", "creation_timestamp": "2025-05-08T02:18:10.886408Z"}, {"uuid": "a48e1677-3a1f-4eac-ba8b-e348ae88a4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-38475", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a45bca37-2eeedf36bb4d3150", "content": "", "creation_timestamp": "2025-05-09T17:05:26.641211Z"}, {"uuid": "3c368da1-abf6-49fe-a6dc-1b142bae0ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3loy3zbf4x226", "content": "", "creation_timestamp": "2025-05-12T13:43:02.219549Z"}, {"uuid": "4d72ad9c-421a-4734-a277-042921fa158a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3loy45ujwlk26", "content": "", "creation_timestamp": "2025-05-12T13:45:35.879253Z"}, {"uuid": "b18cee62-e15b-41d7-8740-25a280bcb0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/osanpo.bsky.social/post/3loxoh263pk2e", "content": "", "creation_timestamp": "2025-05-12T09:40:09.264093Z"}, {"uuid": "8b6d515f-53af-4f2f-a824-e97c78922f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/technofeed.bsky.social/post/3lu546sxxxt2c", "content": "", "creation_timestamp": "2025-07-17T04:35:22.913638Z"}, {"uuid": "f2aa289a-eeab-4515-8830-9d3942c966a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3loysehywcc2f", "content": "", "creation_timestamp": "2025-05-12T20:22:58.731285Z"}, {"uuid": "58140b6b-e742-40bb-9322-9852831cfcee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:14.000000Z"}, {"uuid": "cdd53e1e-f1d1-484a-8018-ef4d24471b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-07-22T03:54:24.000000Z"}, {"uuid": "268fd28f-bf4a-43df-96cf-6d0dc5c41f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "902ede39-48f1-4eb4-9657-509798efc544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "a95d859c-4904-41c1-9573-e1189a396c84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "MISP/82625087-286c-5270-b2a9-3d7793babc4d", "content": "", "creation_timestamp": "2025-09-09T08:14:10.000000Z"}, {"uuid": "0a685171-2e9e-4d74-803e-79a60c892896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-27)", "content": "", "creation_timestamp": "2025-08-27T00:00:00.000000Z"}, {"uuid": "450ff497-c656-48da-ad5f-1b1aaf9cbe7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-09-09T11:53:45.000000Z"}, {"uuid": "5007abba-f6f2-4a43-821b-c42172f589fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-24)", "content": "", "creation_timestamp": "2025-08-24T00:00:00.000000Z"}, {"uuid": "9135e931-73fc-4524-9568-89af73494972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-09)", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "81ca8e3e-d6ff-4f81-b007-b206f3b9fb55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-25)", "content": "", "creation_timestamp": "2026-02-25T00:00:00.000000Z"}, {"uuid": "9f5cc6dc-31e4-4048-b6b5-e4d272860c59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "693f9312-c756-4777-b429-8e45e378640f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-02)", "content": "", "creation_timestamp": "2026-03-02T00:00:00.000000Z"}, {"uuid": "79f77a57-1f05-41e3-8c98-7b04cc805f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-01)", "content": "", "creation_timestamp": "2026-03-01T00:00:00.000000Z"}, {"uuid": "97f2cd57-a241-4e97-b004-2ce3603672d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "f9199854-32d3-4fcf-aaac-6a60158cc44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1644", "content": "", "creation_timestamp": "2025-09-23T04:00:00.000000Z"}, {"uuid": "dcd5b7d3-ee2c-4ceb-847e-ab33a22199f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-17)", "content": "", "creation_timestamp": "2026-03-17T00:00:00.000000Z"}, {"uuid": "c7137c86-900a-4d14-a4a0-96b7d0651064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-10)", "content": "", "creation_timestamp": "2026-03-10T00:00:00.000000Z"}, {"uuid": "735eda60-1861-415d-a47c-5e6d009aea68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/3d3050ec-b24b-4cf2-b07d-6fa859b0f201", "content": "", "creation_timestamp": "2025-11-05T08:42:51.316564Z"}, {"uuid": "10e24d21-55b4-496d-beb7-73f34b697e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "2cef5eb4-dc86-4a38-8a5d-eb0fb20c6d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/a23cbcad-e890-4df8-8736-9332ed4c3d47", "content": "", "creation_timestamp": "2024-07-17T12:43:59.267734Z"}, {"uuid": "6877752c-0d2b-415b-bab6-86821bdc7109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-11)", "content": "", "creation_timestamp": "2026-03-11T00:00:00.000000Z"}, {"uuid": "7dad086b-514d-4dc0-a8ce-7be758e09364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/ff9a96b8-41b6-43fe-b430-913aad09c4c7", "content": "", "creation_timestamp": "2025-05-05T07:56:53.581572Z"}, {"uuid": "b109d179-c4e6-4fc4-a59b-209b45b0af0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "d453e38c-b0c7-49a6-ad33-e10dc40a969d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/70f1e76d-21b5-484f-b14d-4e18035039fc", "content": "", "creation_timestamp": "2026-02-02T12:26:02.714581Z"}, {"uuid": "0b7f06f2-bd40-4f9e-b0c3-c942da88f75c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/cKure/16348", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 \u2604\ufe0fApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709\n\n\ud83d\udd25https://github.com/mrmtwoj/apache-vulnerability-testing", "creation_timestamp": "2026-04-24T21:42:08.000000Z"}, {"uuid": "3d76dea2-773e-4225-aee9-13bdc6092ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-23)", "content": "", "creation_timestamp": "2026-04-23T00:00:00.000000Z"}, {"uuid": "0bcbea90-8773-4e28-8f1c-2663ec660e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14415", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-38475\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained.\n\ud83d\udccf Published: 2024-07-01T18:15:12.292Z\n\ud83d\udccf Modified: 2025-05-01T22:20:22.696Z\n\ud83d\udd17 References:\n1. https://httpd.apache.org/security/vulnerabilities_24.html\n2. https://security.netapp.com/advisory/ntap-20240712-0001/", "creation_timestamp": "2025-05-01T23:17:58.000000Z"}, {"uuid": "a3364895-124e-42a4-90e7-f891a438b545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8689", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709\nURL\uff1ahttps://github.com/mrmtwoj/apache-vulnerability-testing\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-05T20:59:37.000000Z"}, {"uuid": "0f427f28-5a6e-4c10-86ef-d923c6a8d3c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9396", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aexploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)\nURL\uff1ahttps://github.com/soltanali0/CVE-2024-38475\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-12T10:28:56.000000Z"}, {"uuid": "0112be77-9ee7-444c-860f-d180d3bcda9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}, {"uuid": "79880560-8c22-4e0f-98d7-4aa00ca68017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/476", "content": "Top Security News for Today\n\nFake Student Fraud in Community Colleges  \nhttps://www.schneier.com/blog/archives/2025/05/fake-student-fraud-in-community-colleges.html\n\nSonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA100 (CVE-2023-44221, CVE-2024-38475) - watchTowr Labs  \nhttps://www.reddit.com/r/netsec/comments/1kclo6p/sonicboom_from_stolen_tokens_to_remote_shells/\n\nMy Zero Day Quest  \nhttps://www.reddit.com/r/netsec/comments/1kfxobk/my_zero_day_quest/\n\nSnowflake\u2019s AI Bypasses Access Controls  \nhttps://www.reddit.com/r/netsec/comments/1kfwve5/snowflakes_ai_bypasses_access_controls/\n\nThe Cloud Hunting Games  \nhttps://www.reddit.com/r/netsec/comments/1kgcq32/the_cloud_hunting_games/\n\nAI-Powered Cybercrime in 2025 \u2013 The Dark Web\u2019s New Arms Race  \nhttps://www.darknet.org.uk/2025/05/ai-powered-cybercrime-in-2025-the-dark-webs-new-arms-race/\n\nEssential Cybersecurity Controls (ECC-1:2018) \u2013 A Comprehensive Guide  \nhttps://www.tripwire.com/state-of-security/essential-cybersecurity-controls-ecc-12018-comprehensive-guide\n\nInferno Drainer Reloaded: Deep Dive into the Return of the Most Sophisticated Crypto Drainer  \nhttps://research.checkpoint.com/2025/inferno-drainer-reloaded-deep-dive-into-the-return-of-the-most-sophisticated-crypto-drainer/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-05-07T09:30:34.000000Z"}, {"uuid": "80d71af1-528a-4ecd-9072-79387b6178dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "https://t.me/true_secator/7240", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 Secure Mobile Access (SMA) SonicWall \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u0438 \u0440\u0443\u0442\u043a\u0438\u0442\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0439 Google \u043a\u0430\u043a\u00a0UNC6148, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430, \u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u043c\u044b\u0445 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u043a\u0440\u0430\u0436\u0443 \u0434\u0430\u043d\u043d\u044b\u0435, \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 ransomware.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u043a\u043e\u043d\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u043d\u044f\u0442\u044c \u043c\u043e\u0442\u0438\u0432\u0430\u0446\u0438\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0442\u0430\u043a \u0438 \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0447\u0438\u0441\u043b\u043e \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435 \u0441\u043c\u043e\u0433\u043b\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u044c \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u0432\u0435\u043a\u0442\u043e\u0440 \u0430\u0442\u0430\u043a\u0438.\u00a0\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044e Google Mandiant, \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 SonicWall \u0431\u044b\u043b\u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u044b.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0435 \u0441\u0447\u0438\u0442\u0430\u044e\u0442, \u0447\u0442\u043e \u0434\u043b\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 0-day SonicWall SMA 100.\n\n\u041e\u043d\u0438 \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0440\u0430\u043d\u0435\u0435 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c.\u00a0\n\n\u0412 \u0447\u0438\u0441\u043b\u0435 \u0442\u0430\u043a\u0438\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0445 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 SMA, \u043c\u043e\u0433\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c\u0441\u044f CVE-2025-32819, CVE-2024-38475, CVE-2021-20035, CVE-2021-20038 \u0438 CVE-2021-20039.\n\n\u041a\u0430\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0432\u0441\u0435 \u043e\u043d\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u0441\u0435\u0430\u043d\u0441 SSL-VPN \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 SMA \u0438 \u0441\u043e\u0437\u0434\u0430\u043b\u0438 \u043e\u0431\u0440\u0430\u0442\u043d\u044b\u0439 \u0448\u0435\u043b\u043b.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0435 \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u0432 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0435 \u0431\u044b\u043b \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u0435\u043d \u043d\u0430 \u044d\u0442\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Mandiant \u0438 SonicWall (PSIRT) \u043f\u043e\u043b\u043e\u043c\u0430\u043b\u0438 \u0433\u043e\u043b\u043e\u0432\u0443 \u043d\u0430\u0434 \u044d\u0442\u0438\u043c, \u043d\u043e \u043f\u043e\u043d\u044f\u0442\u044c \u043a\u0430\u043a UNC6148 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b \u044d\u0442\u043e\u0442 \u043e\u0431\u0440\u0430\u0442\u043d\u044b\u0439 \u0448\u0435\u043b\u043b, \u0442\u0430\u043a \u0438 \u043d\u0435 \u0441\u043c\u043e\u0433\u043b\u0438.\n\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430.\n\n\u041f\u0440\u043e\u0432\u0435\u0434\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0443 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0440\u0430\u043d\u0435\u0435 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0443\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0443\u044e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u00a0Overstep.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 \u0438 \u0440\u0443\u0442\u043a\u0438\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b\u0439 \u0441\u043a\u0440\u044b\u0442\u043d\u043e \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0434\u043b\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0435\u0433\u043e \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438. \u041e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043a\u0440\u0430\u0436\u0443 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0441\u0435\u0430\u043d\u0441\u043e\u0432 \u0438 \u043e\u0434\u043d\u043e\u0440\u0430\u0437\u043e\u0432\u044b\u0445 \u043f\u0430\u0440\u043e\u043b\u0435\u0439.\n\n\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0442\u043e\u0447\u043d\u044b\u0439 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u043d\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0432 \u0432\u0438\u0434\u0443 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043f\u043e\u0434\u0447\u0438\u0441\u0442\u0438\u043b\u0438 \u0438 \u0437\u0430\u043c\u0435\u043b\u0438 \u0432\u0441\u0435 \u0441\u043b\u0435\u0434\u044b \u0441\u0432\u043e\u0435\u0433\u043e \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f, \u043e\u043f\u0443\u0441\u0442\u043e\u0448\u0438\u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u0444\u0430\u0439\u043b\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0447\u0435\u0442\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0439 \u043c\u043e\u043d\u0437\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u044b\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c SonicWall, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u0441\u0435 \u0436\u0435 \u043d\u0430\u0449\u0443\u043f\u0430\u043b\u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0432\u044f\u0437\u0438 \u0441\u00a0World Leaks (\u043f\u0440\u0435\u0435\u043c\u043d\u0438\u043a \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Hunters International), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441 Abyss.\n\n\u0412 \u0441\u0432\u043e\u0435\u043c \u043e\u0442\u0447\u0435\u0442\u0435 Google \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0430\u0441\u044c \u0438\u043d\u0434\u0438\u043a\u0430\u0442\u043e\u0440\u0430\u043c\u0438 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 (IoC) \u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u0430\u043c\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a UNC6148.", "creation_timestamp": "2025-07-16T17:25:30.000000Z"}, {"uuid": "78fb352f-2330-4a97-81e8-88c616227aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "https://t.me/ton618cyber/3671", "content": "SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models\n\nSonicWall confirms wild exploitation of CVE-2023-44221 and CVE-2024-38475 in SMA100 devices, risking file access and session hijacking.\n\nThe Hacker News | thehackernews\u200b.com \u2022 May 1, 2025", "creation_timestamp": "2025-05-01T11:21:31.000000Z"}, {"uuid": "6f807b4a-7503-4732-89d8-ffdcc749768d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1139", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:39:55.000000Z"}, {"uuid": "e093a5e3-3fd2-47e4-bcdc-0ac01d404f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/ton618cyber/5262", "content": "#exploit\n1. CVE-2024-45409:\nRuby-SAML/GitLab Authentication Bypass\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200:\nMario Kart 8 Deluxe's \"KartLANPwn\" BoF\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n// CVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709", "creation_timestamp": "2024-10-08T16:16:09.000000Z"}, {"uuid": "79174c12-a6a5-49f2-bb17-7d4fa059f586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "https://t.me/ton618cyber/9048", "content": "SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models\n\nSonicWall confirms wild exploitation of CVE-2023-44221 and CVE-2024-38475 in SMA100 devices, risking file access and session hijacking.\n\nThe Hacker News | thehackernews\u200b.com \u2022 May 1, 2025", "creation_timestamp": "2025-05-01T11:21:30.000000Z"}, {"uuid": "f210310b-f81d-4922-9f09-31a01a9ca1db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/CyberDilara/1055", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:00.000000Z"}, {"uuid": "bf1cff76-d582-42ad-9b52-7aeb946aa9fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3843", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:39:20.000000Z"}, {"uuid": "c300f02c-e142-43b9-b800-5c865f1e8276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/GrayHatsHack/8873", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:05.000000Z"}, {"uuid": "130eeff3-c7bb-4be8-98f0-847dc36445e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8948", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:31:33.000000Z"}, {"uuid": "a56c94e3-4a42-421f-a7a0-5529e51daa6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/dilagrafie/3789", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:18.000000Z"}, {"uuid": "7b59bdd9-51e3-4b1a-a3e3-1a9e0543e382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/InfoSecInsider/24253", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:39:40.000000Z"}, {"uuid": "1bd97475-d394-4dd9-b7e2-2bf8494273e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/InfoSecInsider/24061", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:11.000000Z"}, {"uuid": "479f1a39-ecdf-4fcd-a939-5ff34ccce530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/GrayHatsHack/7509", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:05.000000Z"}, {"uuid": "f7929e11-4d52-48df-a2d1-ef1232d12469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4094", "content": "#GitHub #Tools \n\nAutorizePro\u662f\u4e00\u6b3e\u5f3a\u5927\u8d8a\u6743\u68c0\u6d4b Burp \u63d2\u4ef6\uff0c\u901a\u8fc7\u589e\u52a0 AI \u8f85\u52a9\u5206\u6790 &amp;&amp; \u8fdb\u4e00\u6b65\u4f18\u5316\u68c0\u6d4b\u903b\u8f91\uff0c\u5927\u5e45\u964d\u4f4e\u8bef\u62a5\u7387\uff0c\u63d0\u5347\u8d8a\u6743\u6f0f\u6d1e\u68c0\u51fa\u6548\u7387\u3002 [ AutorizePro is a authorization enforcement detection extension for burp suite. By adding Ai-assisted analysis, it significantly reduces the false positive rate and improves the efficiency of vulnerability detection.\n\nhttps://github.com/sule01u/AutorizePro\n\nA security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities.\n\nhttps://github.com/PShlyundin/GPOHunter\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nExploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise.\n\nhttps://github.com/MWR-CyberSec/AD-CS-Forest-Exploiter\n\nNotes about attacking Jenkins servers\n\nhttps://github.com/gquere/pwn_jenkins\n\n#HackersFactory", "creation_timestamp": "2025-01-19T10:41:44.000000Z"}, {"uuid": "ae2556e6-6015-434a-99ab-ff5ed97a44db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7573", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:31:33.000000Z"}, {"uuid": "1454c1e4-4090-4791-a91e-c28873b83f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/InfoSecInsider/492", "content": "Tools - Hackers Factory \n\n#WebApp_Security\n#Offensive_security\n\nBounty Security Tools\n\n]-&gt; GBounty Scanner:\n\nhttps://github.com/BountySecurity/gbounty\n\n]-&gt; GBounty Multi-Step Profiles:\n\nhttps://github.com/BountySecurity/gbounty-profiles\n\n]-&gt; GBounty Profiles Designer:\n\nhttps://github.com/BountySecurity/GBountyProfilesDesigner\n\nTest your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration. \n\nhttps://github.com/promptfoo/promptfoo\n\nRepository for application-layer loop DoS \n\nhttps://github.com/cispa/loop-DoS\n\n#exploit\n\n1. CVE-2024-45409: Ruby-SAML/GitLab Authentication Bypass\n\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200: Mario Kart 8 Deluxe's \"KartLANPwn\" BoF\n\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nCVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-11T06:11:11.000000Z"}, {"uuid": "4b2b48b4-bd47-4652-8712-37848d35a890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7922", "content": "#GitHub #Tools \n\nAutorizePro\u662f\u4e00\u6b3e\u5f3a\u5927\u8d8a\u6743\u68c0\u6d4b Burp \u63d2\u4ef6\uff0c\u901a\u8fc7\u589e\u52a0 AI \u8f85\u52a9\u5206\u6790 &amp;&amp; \u8fdb\u4e00\u6b65\u4f18\u5316\u68c0\u6d4b\u903b\u8f91\uff0c\u5927\u5e45\u964d\u4f4e\u8bef\u62a5\u7387\uff0c\u63d0\u5347\u8d8a\u6743\u6f0f\u6d1e\u68c0\u51fa\u6548\u7387\u3002 [ AutorizePro is a authorization enforcement detection extension for burp suite. By adding Ai-assisted analysis, it significantly reduces the false positive rate and improves the efficiency of vulnerability detection.\n\nhttps://github.com/sule01u/AutorizePro\n\nA security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities.\n\nhttps://github.com/PShlyundin/GPOHunter\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709\n\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n\nExploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise.\n\nhttps://github.com/MWR-CyberSec/AD-CS-Forest-Exploiter\n\nNotes about attacking Jenkins servers\n\nhttps://github.com/gquere/pwn_jenkins\n\n#HackersFactory", "creation_timestamp": "2025-01-19T10:41:51.000000Z"}, {"uuid": "02337ca8-8ed3-4dfc-894a-a891e62fd3df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "exploited", "source": "https://t.me/thehackernews/6763", "content": "\ud83d\udd25 UPDATE - A public PoC exploit is now available for a serious SonicWall SMA exploit chain.\n\n\u27a1\ufe0f CVE-2024-38475: Apache HTTP Server flaw used to bypass auth\n\u27a1\ufe0f CVE-2023-44221: Post-auth command injection via Diagnostics menu\n\nCISA has added both to the KEV catalog \u2014 federal patch deadline: May 22, 2025.\nExploitation is already active in the wild.\n\n\ud83d\udcce Details + PoC: https://thehackernews.com/2025/05/sonicwall-confirms-active-exploitation.html", "creation_timestamp": "2025-05-02T08:47:41.000000Z"}, {"uuid": "5962a2b3-49fb-419e-9cd8-a2ca06e4bff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3285", "content": "https://github.com/mrmtwoj/apache-vulnerability-testing\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709\n#github #exploit", "creation_timestamp": "2024-10-06T03:39:45.000000Z"}, {"uuid": "18f8d332-e519-46b0-b0a0-1acccc684db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11240", "content": "#exploit\n1. CVE-2024-45409:\nRuby-SAML/GitLab Authentication Bypass\nhttps://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass\n\n2. CVE-2024-45200:\nMario Kart 8 Deluxe's \"KartLANPwn\" BoF\nhttps://github.com/latte-soft/kartlanpwn\n\n3. Apache HTTP Server Vulnerability Testing Tool\nhttps://github.com/mrmtwoj/apache-vulnerability-testing\n// CVE-2024-38472, CVE-2024-39573, CVE-2024-38477, CVE-2024-38476, CVE-2024-38475, CVE-2024-38474, CVE-2024-38473, CVE-2023-38709", "creation_timestamp": "2024-10-06T14:45:15.000000Z"}, {"uuid": "3c35f7bf-c454-464b-a088-d7a3dba190a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38475", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/605", "content": "Apache HTTP Server Vulnerability Testing Tool\n\nApache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "creation_timestamp": "2024-11-02T06:39:49.000000Z"}]}