{"vulnerability": "CVE-2024-4558", "sightings": [{"uuid": "4e788303-f496-423e-bf11-f8cd5a77c213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45580", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45580\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Memory corruption while handling multuple IOCTL calls from userspace for remote invocation.\n\ud83d\udccf Published: 2025-03-03T10:07:30.301Z\n\ud83d\udccf Modified: 2025-03-03T10:07:30.301Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", "creation_timestamp": "2025-03-03T10:30:04.000000Z"}, {"uuid": "26342f48-e07f-4cc5-9be3-6700f59b968e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45581", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45581\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Memory corruption while sound model registration for voice activation with audio kernel driver.\n\ud83d\udccf Published: 2025-05-06T08:32:12.241Z\n\ud83d\udccf Modified: 2025-05-07T03:55:40.584Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html", "creation_timestamp": "2025-05-07T04:21:55.000000Z"}, {"uuid": "7e3427fc-633a-454f-abb7-04409d3d3f2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45583", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45583\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Memory corruption while handling multiple IOCTL calls from userspace to operate DMA operations.\n\ud83d\udccf Published: 2025-05-06T08:32:13.494Z\n\ud83d\udccf Modified: 2025-05-07T03:55:39.086Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html", "creation_timestamp": "2025-05-07T04:21:56.000000Z"}, {"uuid": "bb017a2f-6eeb-4a0f-aeb5-ece0381703f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45589", "type": "seen", "source": "https://t.me/cvedetector/4924", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45589 - Gemalto RapidIdentity Authentication DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45589 \nPublished : Sept. 5, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T18:52:45.000000Z"}, {"uuid": "dbeed24e-038b-4ede-8e8f-4e7feca8e064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45588", "type": "seen", "source": "https://t.me/cvedetector/4679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45588 - Symphony XTS Web Trading Misconfigured API Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45588 \nPublished : Sept. 3, 2024, 11:15 a.m. | 42\u00a0minutes ago \nDescription : This vulnerability exists in Symphony XTS Web Trading platform version 2.0.0.1_P160 due to improper access controls on APIs in the Preference module of the application. An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to unauthorized access and modification of sensitive information belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T14:07:49.000000Z"}, {"uuid": "5db67ba6-0c59-4e66-b2df-0cf1639fc7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45587", "type": "seen", "source": "https://t.me/cvedetector/4676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45587 - Symphony XTS Web Trading API Unauthorized Remote Account Compromise\", \n  \"Content\": \"CVE ID : CVE-2024-45587 \nPublished : Sept. 3, 2024, 10:15 a.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : This vulnerability exists in Symphony XTS Web Trading platform version 2.0.0.1_P160 due to improper access controls on APIs in the Transaction module of vulnerable application. An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to compromise of other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T13:17:39.000000Z"}, {"uuid": "b94476a6-66ed-499d-8c58-ea6c5da2f17d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45586", "type": "seen", "source": "https://t.me/cvedetector/4674", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45586 - This vulnerability exists due to improper access c\", \n  \"Content\": \"CVE ID : CVE-2024-45586 \nPublished : Sept. 3, 2024, 10:15 a.m. | 51\u00a0minutes ago \nDescription : This vulnerability exists due to improper access controls on APIs in the Authentication module of Symphony XTS Web Trading and Mobile Trading platforms (version 2.0.0.1_P160). An authenticated remote attacker could exploit this vulnerability by manipulating parameters through HTTP request which could lead to unauthorized account take over belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T13:17:37.000000Z"}, {"uuid": "df327aa1-711c-4635-ad17-350eaca20d6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45582", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/cf59c148-4047-4ccd-8ba0-26fb7197899c", "content": "", "creation_timestamp": "2025-02-03T19:33:09.293698Z"}, {"uuid": "f2b002dc-8238-4dcd-bba0-9d926dbfd7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45582", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhc2blp4o32w", "content": "", "creation_timestamp": "2025-02-03T17:16:55.463769Z"}, {"uuid": "490720df-0b62-4838-ad4f-da1a041d7e77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45580", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "1b770012-8aed-408e-991a-b6d069bf1228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45584", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:19.000000Z"}, {"uuid": "177f0b0c-b344-4d66-88f1-04786e2c3860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45584", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhc2bnsmpw27", "content": "", "creation_timestamp": "2025-02-03T17:16:57.728289Z"}, {"uuid": "3ead8340-c13b-4fdc-a04a-2ed13645582d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45580", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114098301336580517", "content": "", "creation_timestamp": "2025-03-03T11:38:32.877166Z"}, {"uuid": "a1c349d3-27ec-4c25-ac21-e04cb84da053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45580", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "adf8dbcd-bb1c-4234-b490-67293a32e8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45589", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8442", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWriteup and proof-of-concept code for CVE-2024-45589\nURL\uff1ahttps://github.com/BenRogozinski/CVE-2024-45589\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-03T03:35:21.000000Z"}]}