{"vulnerability": "cve-2024-45789", "sightings": [{"uuid": "e6c1c47b-ffae-49e8-9594-c68fd59e5dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45789", "type": "seen", "source": "https://t.me/cvedetector/5347", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45789 - VMware aiM-Star Infinite Account Registration Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-45789 \nPublished : Sept. 11, 2024, 12:15 p.m. | 38\u00a0minutes ago \nDescription : This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the \u2018mode\u2019 parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T15:20:25.000000Z"}]}