{"vulnerability": "cve-2024-4510", "sightings": [{"uuid": "b39fce5d-e29a-49ed-ad45-7c2928c349d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45102", "type": "seen", "source": "https://t.me/cvedetector/15380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45102 - LXCA XCC Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-45102 \nPublished : Jan. 14, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A privilege escalation vulnerability was discovered that could allow a valid, authenticated LXCA user to escalate their permissions for a connected XCC instance when using LXCA as a Single Sign On (SSO) provider for XCC instances. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T00:03:22.000000Z"}, {"uuid": "51c96f9e-bdfe-45c1-bd95-998e1a763623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45105", "type": "seen", "source": "https://t.me/cvedetector/5640", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45105 - Lenovo ThinkSystem UEFI SMM Callout Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45105 \nPublished : Sept. 13, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : An internal product security audit discovered a UEFI SMM (System Management Mode) callout vulnerability in some ThinkSystem servers that could allow a local attacker with elevated privileges to execute arbitrary code. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T21:18:53.000000Z"}, {"uuid": "efeb49d9-163e-4641-9a56-583ce178826b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45103", "type": "seen", "source": "https://t.me/cvedetector/5643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45103 - Citrix LXCA Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45103 \nPublished : Sept. 13, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A valid, authenticated LXCA user may be able to unmanage an LXCA managed device in through the LXCA web interface without sufficient privileges. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T21:18:59.000000Z"}, {"uuid": "546aced4-bec0-4365-9f7f-eab22a2cf62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45100", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5q7z33np2i", "content": "", "creation_timestamp": "2025-01-07T13:16:02.933357Z"}, {"uuid": "6dedbaa3-a828-423c-9a69-29ad1b740f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45100", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5q7z33np2i", "content": "", "creation_timestamp": "2025-01-07T13:16:02.961229Z"}, {"uuid": "3021575a-d91d-4ec6-b90b-a7e3870b0988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45106", "type": "seen", "source": "https://t.me/cvedetector/11878", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45106 - Apache Ozone S3 Gateway Kerberos Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-45106 \nPublished : Dec. 3, 2024, 10:15 a.m. | 1\u00a0hour ago \nDescription : Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:  \n  *  ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.  \n  *  The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.  \n  \n  \nUsers are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T12:19:20.000000Z"}, {"uuid": "2d7a8ce2-08bc-461b-a1b0-b7fc2abfa9f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45101", "type": "seen", "source": "https://t.me/cvedetector/5642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45101 - LXCA VMware Privilege Escalation Cheat URL Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45101 \nPublished : Sept. 13, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A privilege escalation vulnerability was discovered when Single Sign On (SSO) is enabled that could allow an attacker to intercept a valid, authenticated LXCA user\u2019s XCC session if they can convince the user to click on a specially crafted URL. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T21:18:57.000000Z"}, {"uuid": "20b983d4-8a31-483c-831e-448032080058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45104", "type": "seen", "source": "https://t.me/cvedetector/5639", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45104 - LXCA Privilege Escalation RCE\", \n  \"Content\": \"CVE ID : CVE-2024-45104 \nPublished : Sept. 13, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A valid, authenticated LXCA user without sufficient privileges may be able to use the device identifier to modify an LXCA managed device through a specially crafted web API call. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T21:18:52.000000Z"}, {"uuid": "a7482492-8efa-4644-ab65-d74c2af1d0d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45107", "type": "seen", "source": "https://t.me/cvedetector/4892", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45107 - Adobe Acrobat Reader Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45107 \nPublished : Sept. 5, 2024, 9:15 a.m. | 35\u00a0minutes ago \nDescription : Acrobat Reader versions 20.005.30636, 24.002.20964, 24.001.30123, 24.002.20991 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T12:09:55.000000Z"}, {"uuid": "ed5be43e-c4aa-4828-ae92-fe51187dc0cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45100", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45100\n\ud83d\udd39 Description: IBM Security ReaQta 3.12\u00a0could allow a privileged user to cause a denial of service by sending multiple administration requests due to improper allocation of resources.\n\ud83d\udccf Published: 2025-01-07T12:22:53.822Z\n\ud83d\udccf Modified: 2025-01-07T12:22:53.822Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7180313", "creation_timestamp": "2025-01-07T12:36:35.000000Z"}, {"uuid": "34f01239-5577-4f38-9492-f8730a691fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45100", "type": "seen", "source": "https://t.me/cvedetector/14540", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45100 - IBM Security ReaQta Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-45100 \nPublished : Jan. 7, 2025, 1:15 p.m. | 21\u00a0minutes ago \nDescription : IBM Security ReaQta 3.12\u00a0could allow a privileged user to cause a denial of service by sending multiple administration requests due to improper allocation of resources. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T14:42:44.000000Z"}, {"uuid": "44d88ddc-8cb1-4ead-a741-7c77c2d7f71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45108", "type": "seen", "source": "https://t.me/cvedetector/5592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45108 - Adobe Photoshop Arbitrary Code Execution Vulneability\", \n  \"Content\": \"CVE ID : CVE-2024-45108 \nPublished : Sept. 13, 2024, 10:15 a.m. | 39\u00a0minutes ago \nDescription : Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T12:56:53.000000Z"}, {"uuid": "49e05f14-61db-4268-a4bc-d729150ee1f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45109", "type": "seen", "source": "https://t.me/cvedetector/5590", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45109 - Adobe Photoshop Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45109 \nPublished : Sept. 13, 2024, 10:15 a.m. | 39\u00a0minutes ago \nDescription : Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T12:56:51.000000Z"}, {"uuid": "35fe6f3d-9c08-4935-b70b-d469306f5fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45106", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113588139136376999", "content": "", "creation_timestamp": "2024-12-03T09:17:35.611019Z"}, {"uuid": "c14c1075-9b54-4c0e-b38f-1e0bb8ddc585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45100", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5sd56pbr2e", "content": "", "creation_timestamp": "2025-01-07T13:53:35.322817Z"}]}