{"vulnerability": "cve-2024-4570", "sightings": [{"uuid": "e0da4efc-2d92-4187-b54d-711cb1ba0b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45700", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45700\n\ud83d\udd25 CVSS Score: 6 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.\n\ud83d\udccf Published: 2025-04-02T06:13:26.681Z\n\ud83d\udccf Modified: 2025-04-02T06:13:26.681Z\n\ud83d\udd17 References:\n1. https://support.zabbix.com/browse/ZBX-26253", "creation_timestamp": "2025-04-02T06:34:40.000000Z"}, {"uuid": "540a76b4-4e5b-4339-9712-52af4ec10c28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45709", "type": "seen", "source": "https://t.me/cvedetector/12487", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45709 - SolarWinds Web Help Desk Linux Local File Read\", \n  \"Content\": \"CVE ID : CVE-2024-45709 \nPublished : Dec. 10, 2024, 9:15 a.m. | 31\u00a0minutes ago \nDescription : SolarWinds Web Help Desk was susceptible to a local file read vulnerability.  This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T10:47:04.000000Z"}, {"uuid": "aba46de3-cf2b-4334-85fb-d3cdc71eb381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45709", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113663448554554747", "content": "", "creation_timestamp": "2024-12-16T16:29:46.268603Z"}, {"uuid": "e9a3d9db-2b6b-423c-ae13-14a275d70a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45700", "type": "seen", "source": "https://t.me/cvedetector/21847", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45700 - Zabbix Server Memory Exhaustion Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-45700 \nPublished : April 2, 2025, 7:15 a.m. | 53\u00a0minutes ago \nDescription : Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T10:48:20.000000Z"}, {"uuid": "a2c3f880-2262-4dd6-afe5-4825abf2d06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45700", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llsznbw22m2e", "content": "", "creation_timestamp": "2025-04-02T09:01:38.096938Z"}]}