{"vulnerability": "cve-2024-2374", "sightings": [{"uuid": "04321f78-f3ec-4688-86b0-daf39ee42be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjm644xfd72t", "content": "", "creation_timestamp": "2026-04-16T10:08:48.661570Z"}, {"uuid": "d720c215-4c7f-46dc-8809-3b6fbf881198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/198452", "content": "https://ift.tt/sGbaXrV\nCVE-2024-23749 | KiTTY up to 0.76.1.13 filename command injection (ID 177031)", "creation_timestamp": "2024-03-02T19:21:23.000000Z"}, {"uuid": "d01cf44b-aec7-4c89-93e1-3a77d77209a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/75", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T07:06:00.000000Z"}, {"uuid": "3a82d6cc-ef8b-44d0-92ab-74e5561c42b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6859", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}, {"uuid": "c9f8d43f-ae77-4b35-85ec-01da6c65a236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/arpsyndicate/3377", "content": "#ExploitObserverAlert\n\nCVE-2024-23749\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23749. KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-11T13:04:04.000000Z"}, {"uuid": "5ac94b06-ee2c-4013-b3ae-5c2b1faefa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23747", "type": "seen", "source": "https://t.me/ctinow/189685", "content": "https://ift.tt/uO86CPD\nCVE-2024-23747 | Moderna Sistemas ModernaNet Hospital Management System 2024 Laudo id resource injection", "creation_timestamp": "2024-02-21T15:42:15.000000Z"}, {"uuid": "1abee689-1a59-49e9-85dd-ae81f85dbb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/192606", "content": "https://ift.tt/6FY2mrt\nCVE-2024-23746 | Miro Desktop 0.8.18 on macOS Electron code injection", "creation_timestamp": "2024-02-24T14:47:06.000000Z"}, {"uuid": "3cb16291-4200-4acb-81fe-5cb6d79ae04d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23743", "type": "seen", "source": "https://t.me/ctinow/189339", "content": "https://ift.tt/MKmIB5k\nCVE-2024-23743 | Notion up to 3.1.0 on macOS RunAsNode/enableNodeClilnspectArguments Privilege Escalation", "creation_timestamp": "2024-02-21T08:36:48.000000Z"}, {"uuid": "1070dd5e-0ce6-4c39-8020-8a220f217ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/182460", "content": "https://ift.tt/wMyhdJN\nCVE-2024-23746 Exploit", "creation_timestamp": "2024-02-10T08:16:24.000000Z"}, {"uuid": "7ee91f00-490e-480a-bb36-40ac52568081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23741", "type": "seen", "source": "https://t.me/ctinow/189338", "content": "https://ift.tt/B5XiUc1\nCVE-2024-23741 | Hyper up to 3.4.1 on macOS Setting RunAsNode/enableNodeClilnspectArguments Privilege Escalation", "creation_timestamp": "2024-02-21T08:36:47.000000Z"}, {"uuid": "d439e630-31f2-4046-a465-d7e18d292a13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23742", "type": "seen", "source": "https://t.me/ctinow/189337", "content": "https://ift.tt/FwcAxiT\nCVE-2024-23742 | Loom up to 0.196.1 on macOS Setting RunAsNode/enableNodeClilnspectArguments Privilege Escalation", "creation_timestamp": "2024-02-21T08:36:46.000000Z"}, {"uuid": "5438a239-d010-47cb-929b-bcdba02a714d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23740", "type": "seen", "source": "https://t.me/ctinow/189306", "content": "https://ift.tt/iy4mgO0\nCVE-2024-23740 | Kap up to 3.6.0 on macOS Setting RunAsNode/enableNodeClilnspectArguments Privilege Escalation", "creation_timestamp": "2024-02-21T08:06:55.000000Z"}, {"uuid": "e6b84dc2-25d8-46d7-8ea9-867b139dfe95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/184478", "content": "https://ift.tt/qmHZh9g\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)", "creation_timestamp": "2024-02-14T08:56:59.000000Z"}, {"uuid": "a0adab26-abed-4530-92d5-333e736b01cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23744", "type": "seen", "source": "https://t.me/ctinow/186183", "content": "https://ift.tt/k59LNRT\nCVE-2024-23744 | mbed TLS 3.5.1 TLS 1.3 ClientHallo denial of service (Issue 8694)", "creation_timestamp": "2024-02-16T08:46:09.000000Z"}, {"uuid": "9dc6d8b4-19f6-4a67-997a-8f871fe1ff49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23745", "type": "seen", "source": "https://t.me/ctinow/190659", "content": "https://ift.tt/1b6WvN7\nCVE-2024-23745 | Notion Web Clipper 1.0.3(7) NIB File command injection", "creation_timestamp": "2024-02-22T12:06:52.000000Z"}, {"uuid": "16e8f14f-cbc2-49f7-8a4b-0e21b7fcf7a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/184827", "content": "https://ift.tt/zX2jMrY\nCVE-2024-23749 Exploit", "creation_timestamp": "2024-02-14T17:16:42.000000Z"}, {"uuid": "0493569e-e394-4365-b886-379e89cff306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23743", "type": "seen", "source": "https://t.me/ctinow/177873", "content": "https://ift.tt/qkdGiOI\nCVE-2024-23743 Exploit", "creation_timestamp": "2024-02-02T02:16:50.000000Z"}, {"uuid": "dab7900b-9aa2-478f-81dd-137dfae5bd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23744", "type": "seen", "source": "https://t.me/ctinow/170939", "content": "https://ift.tt/yGwBU1b\nCVE-2024-23744", "creation_timestamp": "2024-01-22T00:22:13.000000Z"}, {"uuid": "00e5331b-ee91-40cc-9dc5-8a80adc3d5e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/181904", "content": "https://ift.tt/libAoBP\nCVE-2024-23749", "creation_timestamp": "2024-02-09T09:21:45.000000Z"}, {"uuid": "6bad65dc-e1ce-4f99-9743-a363d550b284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/177902", "content": "https://ift.tt/qZmQasy\nCVE-2024-23746", "creation_timestamp": "2024-02-02T03:22:08.000000Z"}, {"uuid": "7ad4541e-49ed-44fc-b5a5-2f6d58f900a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23747", "type": "seen", "source": "https://t.me/ctinow/177950", "content": "https://ift.tt/fgNWayr\nCVE-2024-23747 Exploit", "creation_timestamp": "2024-02-02T08:16:14.000000Z"}, {"uuid": "175b6e63-edb9-4b05-9dcc-4d368edd8ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23747", "type": "seen", "source": "https://t.me/ctinow/175316", "content": "https://ift.tt/nsvrfl4\nCVE-2024-23747", "creation_timestamp": "2024-01-29T15:26:34.000000Z"}, {"uuid": "41f7f72f-2836-4b22-93a9-74762743ee04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23742", "type": "seen", "source": "https://t.me/ctinow/174831", "content": "https://ift.tt/6JoIXdb\nCVE-2024-23742", "creation_timestamp": "2024-01-28T04:26:39.000000Z"}, {"uuid": "af49a0e9-c5d7-4a22-a9a4-bccf816a5db1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23741", "type": "seen", "source": "https://t.me/ctinow/174830", "content": "https://ift.tt/8ADuhp6\nCVE-2024-23741", "creation_timestamp": "2024-01-28T04:26:38.000000Z"}, {"uuid": "dd1d92e3-f77f-46a0-96dd-e645167fa2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23743", "type": "seen", "source": "https://t.me/ctinow/174828", "content": "https://ift.tt/Ecv43GQ\nCVE-2024-23743", "creation_timestamp": "2024-01-28T03:26:28.000000Z"}, {"uuid": "eed27cc2-3f3b-4446-a4eb-c048d6fa6e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23745", "type": "seen", "source": "https://t.me/ctinow/176443", "content": "https://ift.tt/cJrgsni\nCVE-2024-23745", "creation_timestamp": "2024-01-31T03:32:10.000000Z"}, {"uuid": "69988b48-8e98-43f8-85e2-539f277c0994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23740", "type": "seen", "source": "https://t.me/ctinow/174839", "content": "https://ift.tt/iuEGpO4\nCVE-2024-23740", "creation_timestamp": "2024-01-28T05:26:51.000000Z"}, {"uuid": "6aba6ff2-6c18-49d1-a8eb-9e96f7b273e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/CNArsenal/1987", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-02-16T04:17:14.000000Z"}, {"uuid": "6444b30a-e0a3-4e71-a5ca-5c02c9ed88b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9870", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-01-29T11:38:00.000000Z"}, {"uuid": "0716b3cc-a994-4cb6-84e5-0f7970c3d700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10903", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T11:01:36.000000Z"}, {"uuid": "03f368e7-65bf-412e-8b99-13e34864ffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}, {"uuid": "357ba09e-47e2-4490-912c-72b6984afe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2665", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:55.000000Z"}, {"uuid": "de97f726-cf6c-4921-98bd-3935ab22b224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2634", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:43.000000Z"}, {"uuid": "a53393d1-7f72-4bcb-b6b8-94a35060e39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3510", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-08-16T11:18:08.000000Z"}]}