{"vulnerability": "cve-2024-4541", "sightings": [{"uuid": "96614396-688e-4b9c-ac69-becd205d4544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45412", "type": "seen", "source": "https://t.me/cvedetector/5265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45412 - Yeti Denial of Service thru Unicode Normalization\", \n  \"Content\": \"CVE ID : CVE-2024-45412 \nPublished : Sept. 10, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (\u2100), or U+2105 (\u2105) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T19:15:45.000000Z"}, {"uuid": "082aeda2-f9d6-4787-a7cb-f9ea8c64c53c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45411", "type": "seen", "source": "https://t.me/cvedetector/5123", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45411 - Twig Unvalidated Template Injection\", \n  \"Content\": \"CVE ID : CVE-2024-45411 \nPublished : Sept. 9, 2024, 7:15 p.m. | 40\u00a0minutes ago \nDescription : Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T22:20:18.000000Z"}, {"uuid": "915811f6-fac0-47d5-9ad1-22a4d6d9cdc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-45410", "type": "seen", "source": "https://gist.github.com/fernandinand/80cb943bc13477d76a3adff5cb86715c", "content": "", "creation_timestamp": "2026-04-22T13:26:30.000000Z"}, {"uuid": "23703926-cb59-4f82-accb-91c4dc2e01ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45418", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5371", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45418\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.\n\ud83d\udccf Published: 2025-02-25T19:52:25.471Z\n\ud83d\udccf Modified: 2025-02-25T20:07:09.959Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-24040/", "creation_timestamp": "2025-02-25T20:22:57.000000Z"}, {"uuid": "04f6c636-e68f-4333-92e9-077eaf5c5434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45419", "type": "seen", "source": "https://t.me/cvedetector/11517", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45419 - Zoom Privileged Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45419 \nPublished : Nov. 19, 2024, 8:15 p.m. | 27\u00a0minutes ago \nDescription : Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T21:51:19.000000Z"}, {"uuid": "6313c4aa-e3f4-4688-8660-a64eb6573879", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45410", "type": "seen", "source": "https://t.me/cvedetector/6086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45410 - Traefik HTTP/1.1 Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45410 \nPublished : Sept. 19, 2024, 11:15 p.m. | 41\u00a0minutes ago \nDescription : Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T02:11:46.000000Z"}, {"uuid": "4dd41792-ddfe-4d96-91cb-0a1bb860b158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45417", "type": "seen", "source": "https://t.me/cvedetector/18926", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45417 - Zoom macOS Installer Resource Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45417 \nPublished : Feb. 25, 2025, 8:15 p.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T23:14:27.000000Z"}, {"uuid": "2d374ba3-d203-40a4-b7d9-905e358159b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45417", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5384", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45417\n\ud83d\udd25 CVSS Score: 6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.\n\ud83d\udccf Published: 2025-02-25T19:49:22.296Z\n\ud83d\udccf Modified: 2025-02-25T19:49:22.296Z\n\ud83d\udd17 References:\n1. https://www.zoom.com/en/trust/security-bulletin/zsb-24039/", "creation_timestamp": "2025-02-25T20:23:14.000000Z"}, {"uuid": "e33d6f5c-ce5b-4bce-8463-390909cdf275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45413", "type": "seen", "source": "https://t.me/cvedetector/5768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45413 - ZTE HTTPD RSA Decrypt RCE Stack Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-45413 \nPublished : Sept. 16, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T23:43:35.000000Z"}, {"uuid": "c0b1591e-e88f-4789-b510-1ac12fa248d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45416", "type": "seen", "source": "https://t.me/cvedetector/5767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45416 - ZTE HTTPD Lua File Inclusion Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-45416 \nPublished : Sept. 16, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T23:43:34.000000Z"}, {"uuid": "0bfcdc18-6f4a-416a-8dc0-4b65c583dd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45415", "type": "seen", "source": "https://t.me/cvedetector/5770", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45415 - ZTE HTTPD Stack-based Buffer Overflow RCE\", \n  \"Content\": \"CVE ID : CVE-2024-45415 \nPublished : Sept. 16, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in check_data_integrity function. This function is responsible for validating the checksum of data in post request. The checksum is sent encrypted in the request, the function decrypts it and stores the checksum on the stack without validating it. An unauthenticated attacker can get RCE as root by exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T23:43:37.000000Z"}, {"uuid": "5a18f108-e2f7-48b0-8909-48134212c5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45414", "type": "seen", "source": "https://t.me/cvedetector/5769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45414 - ZTE HTTPD Root Stack Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-45414 \nPublished : Sept. 16, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encrypted data is supplied base64 encoded. The decoded ciphertext is stored on the stack without checking its length. An unauthenticated attacker can get RCE as root by exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T23:43:36.000000Z"}]}