{"vulnerability": "CVE-2024-4143", "sightings": [{"uuid": "dd5b6cbf-0a24-4ebe-91de-17f56b6c70f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41439", "type": "seen", "source": "https://t.me/cvedetector/2063", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41439 - Cute PNG Heap Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41439 \nPublished : July 30, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : A heap buffer overflow in the function cp_block() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T22:26:10.000000Z"}, {"uuid": "b90baa5c-c289-4b62-a525-87e5969fc38b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41433", "type": "seen", "source": "https://t.me/cvedetector/4724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41433 - TiDB Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41433 \nPublished : Sept. 3, 2024, 9:15 p.m. | 44\u00a0minutes ago \nDescription : PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component expression.ExplainExpressionList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T00:10:03.000000Z"}, {"uuid": "03ddc781-e84d-4f88-b1e1-16b6e1ac3eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41434", "type": "seen", "source": "https://t.me/cvedetector/4720", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41434 - TiDB Column Buffer Overflow DoS\", \n  \"Content\": \"CVE ID : CVE-2024-41434 \nPublished : Sept. 3, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component (*Column).GetDecimal. This allows attackers to cause a Denial of Service (DoS) via a crafted input to the 'RemoveUnnecessaryFirstRow', it will check the expression between 'Agg' and 'GroupBy', but does not check the return type. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T23:19:54.000000Z"}, {"uuid": "492fb812-d8e0-4803-9337-ace7a9d5f9b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41435", "type": "seen", "source": "https://t.me/cvedetector/4714", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41435 - YugabyteDB Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41435 \nPublished : Sept. 3, 2024, 7:15 p.m. | 23\u00a0minutes ago \nDescription : YugabyteDB v2.21.1.0 was discovered to contain a buffer overflow via the \"insert into\" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T21:39:32.000000Z"}, {"uuid": "5aa7580e-4668-40ab-9a5a-e0a2788ed4d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41436", "type": "seen", "source": "https://t.me/cvedetector/4711", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41436 - ClickHouse Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41436 \nPublished : Sept. 3, 2024, 7:15 p.m. | 23\u00a0minutes ago \nDescription : ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T21:39:26.000000Z"}, {"uuid": "85f0b08e-fd69-425b-ba4a-860ac1dc3233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41438", "type": "seen", "source": "https://t.me/cvedetector/2064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41438 - Hicolor Cute PNG Heap Buffer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-41438 \nPublished : July 30, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : A heap buffer overflow in the function cp_stored() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T22:26:11.000000Z"}, {"uuid": "ab256e45-59aa-4855-ab2d-a49bb584e902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41437", "type": "seen", "source": "https://t.me/cvedetector/2067", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41437 - hicolor Heap Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41437 \nPublished : July 30, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : A heap buffer overflow in the function cp_unfilter() (/vendor/cute_png.h) of hicolor v0.5.0 allows attackers to cause a Denial of Service (DoS) via a crafted PNG file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T22:26:14.000000Z"}, {"uuid": "3899a3e6-8af5-4ef1-bb09-85fc23310536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4143", "type": "seen", "source": "https://t.me/cvedetector/910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4143 - HP AMI BIOS arbitrary code execution vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4143 \nPublished : July 15, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : A potential security vulnerability has been identified in certain HP PC products using AMI BIOS, which might allow arbitrary code execution. AMI has released firmware updates to mitigate this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T01:13:06.000000Z"}]}