{"vulnerability": "CVE-2024-4575", "sightings": [{"uuid": "60c29cfa-7829-4ac7-b3f6-e928f3705cf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45750", "type": "seen", "source": "", "content": "", "creation_timestamp": "2024-11-13T07:35:37.060623Z"}, {"uuid": "4f650a07-c3d7-44b4-99b3-d025ed063ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-45757", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113590885349233412", "content": "", "creation_timestamp": "2024-12-03T20:55:59.531173Z"}, {"uuid": "bd6409fe-833d-4f9b-9527-21b8e545af55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-45755", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113544683796812204", "content": "", "creation_timestamp": "2024-11-25T17:06:19.902124Z"}, {"uuid": "bc054938-b3e4-43d1-985c-7dbf9f347a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4575", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lpvmkpisu22w", "content": "", "creation_timestamp": "2025-05-24T07:26:20.147057Z"}, {"uuid": "d8a85a6f-cdc7-4a83-a95b-4b1e1e6a1ab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45758", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lyes4zoyps27", "content": "", "creation_timestamp": "2025-09-09T03:37:29.978436Z"}, {"uuid": "194ace2a-5b7f-483b-a062-e5057f7c69ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45758", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ly2n3nag2s2b", "content": "", "creation_timestamp": "2025-09-05T02:40:36.871415Z"}, {"uuid": "f4a42c09-ba82-4fa8-9c22-769e2c465241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45759", "type": "seen", "source": "https://t.me/cvedetector/10153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45759 - Dell PowerProtect Data Domain Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45759 \nPublished : Nov. 8, 2024, 3:15 a.m. | 46\u00a0minutes ago \nDescription : Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an escalation of privilege vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to unauthorized execution of certain commands to overwrite system config of the application. Exploitation may lead to denial of service of system. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T05:29:04.000000Z"}, {"uuid": "d9ba2e64-397c-4f3f-8ad2-0b591efe6314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45750", "type": "seen", "source": "https://t.me/cvedetector/6355", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45750 - TheGreenBow VPN Authentication Bypass Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45750 \nPublished : Sept. 25, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : An issue in TheGreenBow Windows Standard VPN Client 6.87.108 (and older), Windows Enterprise VPN Client 6.87.109 (and older), Windows Enterprise VPN Client 7.5.007 (and older), Android VPN Client 6.4.5 (and older) VPN Client Linux 3.4 (and older), VPN Client MacOS 2.4.10 (and older) allows a remote attacker to execute arbitrary code via the IKEv2 Authentication phase, it accepts malformed ECDSA signatures and establishes the tunnel. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T21:03:40.000000Z"}, {"uuid": "e824cfa5-a12c-4ae4-8c90-7ca90734a667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45758", "type": "seen", "source": "https://t.me/cvedetector/4978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45758 - H2O.ai H2O Unvalidated JDBC URL Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-45758 \nPublished : Sept. 6, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:06:35.000000Z"}, {"uuid": "d73c9c84-705a-4cc5-b700-66154f7d22c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45751", "type": "seen", "source": "https://t.me/cvedetector/4950", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45751 - tgt PRNG predictable seeding vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45751 \nPublished : Sept. 6, 2024, 5:15 a.m. | 40\u00a0minutes ago \nDescription : tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T08:14:56.000000Z"}, {"uuid": "905bea9f-1bb9-4987-bbd6-1a4187db2731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-45756", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113544726261051737", "content": "", "creation_timestamp": "2024-11-25T17:17:07.661573Z"}, {"uuid": "0e740272-fb5a-47cd-8302-6ecb21a20876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45751", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lveeqrcqxc2t", "content": "", "creation_timestamp": "2025-08-01T19:22:27.082092Z"}, {"uuid": "ff24dce8-301a-4584-b7c9-0a7e3d9c83d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45751", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvefrinwck2t", "content": "", "creation_timestamp": "2025-08-01T19:40:44.316903Z"}, {"uuid": "c9fe2b02-c662-4768-9974-517b75bb616a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45751", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvejh6tnos2t", "content": "", "creation_timestamp": "2025-08-01T20:46:34.518858Z"}, {"uuid": "53c21344-5403-4927-96b2-657a6283bec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45757\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access.\n\ud83d\udccf Published: 2024-12-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T16:23:16.243Z\n\ud83d\udd17 References:\n1. https://github.com/centreon/centreon/releases\n2. https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-45757-centreon-bam-high-severity-4123?tid=4123", "creation_timestamp": "2025-05-02T17:16:48.000000Z"}, {"uuid": "53ce7b5e-31fb-49f0-b5cb-fad5ca98919a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45754", "type": "seen", "source": "https://t.me/cvedetector/7753", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45754 - Centreon BI Server SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45754 \nPublished : Oct. 11, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in the centreon-bi-server component in Centreon BI Server 24.04.x before 24.04.3, 23.10.x before 23.10.8, 23.04.x before 23.04.11, and 22.10.x before 22.10.11. SQL injection can occur in the listing of configured reporting jobs. Exploitation is only accessible to authenticated users with high-privileged access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-12T01:05:55.000000Z"}, {"uuid": "4601180d-0deb-46d0-bdbe-fec5447594c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45752", "type": "seen", "source": "https://t.me/cvedetector/6061", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45752 - Logiops Unrestricted D-Bus Configuration Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45752 \nPublished : Sept. 19, 2024, 4:15 p.m. | 24\u00a0minutes ago \nDescription : logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T18:40:10.000000Z"}, {"uuid": "7d5da04e-07be-443c-ac49-0cc19748c7c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45759", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445078685760592", "content": "", "creation_timestamp": "2024-11-08T02:55:26.508606Z"}, {"uuid": "c298e955-5adf-4d3d-b349-ddc42e1a84bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45757", "type": "seen", "source": "https://t.me/cvedetector/11917", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45757 - Centreon Centreon-bam SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-45757 \nPublished : Dec. 3, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T23:11:20.000000Z"}]}