{"uuid": "d9ba2e64-397c-4f3f-8ad2-0b591efe6314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45750", "type": "seen", "source": "https://t.me/cvedetector/6355", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45750 - TheGreenBow VPN Authentication Bypass Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45750 \nPublished : Sept. 25, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T21:03:40.000000Z"}