{"vulnerability": "CVE-2024-4188", "sightings": [{"uuid": "ed689035-6d07-4138-a7fb-f4634ca54fc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41886", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706203961821532", "content": "", "creation_timestamp": "2024-12-24T05:43:01.975737Z"}, {"uuid": "772a3399-4e18-4cbe-81e3-42136182d035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4188241887", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706203961821532", "content": "", "creation_timestamp": "2024-12-24T05:43:02.005703Z"}, {"uuid": "8855b596-8100-4cb0-b0a8-a3f64e5a834c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41887", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706262965997404", "content": "", "creation_timestamp": "2024-12-24T05:58:02.193937Z"}, {"uuid": "a22d111a-a58e-4076-8ea3-17b7513d2792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4188241887", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706262965997404", "content": "", "creation_timestamp": "2024-12-24T05:58:02.223252Z"}, {"uuid": "46058cde-f389-435b-b020-8f86f8ef0f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41882", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsa7ivdb2a", "content": "", "creation_timestamp": "2024-12-24T06:16:06.565884Z"}, {"uuid": "443891ed-16b3-4398-9f1c-dff5fbb72f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41883", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsabtu5i2o", "content": "", "creation_timestamp": "2024-12-24T06:16:09.158113Z"}, {"uuid": "59beddf8-db6c-4b57-91a3-26903925ff6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41884", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsaeajsm2m", "content": "", "creation_timestamp": "2024-12-24T06:16:11.359012Z"}, {"uuid": "61ee96da-6b67-4f4a-8c5b-6bbf75d64d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41885", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsagdmlf2e", "content": "", "creation_timestamp": "2024-12-24T06:16:13.670628Z"}, {"uuid": "c4f00c52-d17e-4fa4-806e-66cd5850c7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41886", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsaj3o6425", "content": "", "creation_timestamp": "2024-12-24T06:16:16.935504Z"}, {"uuid": "52962c7f-8916-4a76-a8f6-27b2ba8e98ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41887", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzsalgp4w2i", "content": "", "creation_timestamp": "2024-12-24T06:16:18.949342Z"}, {"uuid": "61ba94b8-3d35-4cfa-9045-bbeb2b820382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41887", "type": "seen", "source": "https://t.me/cvedetector/13561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41887 - Hikvision NVR Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41887 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR.\u00a0An attacker can create an NVR log file in a directory one level higher on the system, which can be used to corrupt files in the directory.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:38.000000Z"}, {"uuid": "f74ad099-c29a-4d1c-8a7c-afa12d4c742c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41886", "type": "seen", "source": "https://t.me/cvedetector/13559", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41886 - Vivotek NVR Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41886 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR.\u00a0An attacker could inject malformed data into url input parameters to reboot the NVR.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:36.000000Z"}, {"uuid": "3d2cde5e-88f1-444f-adce-8d6f49bf4e4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41884", "type": "seen", "source": "https://t.me/cvedetector/13558", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41884 - Honeywell NVR Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41884 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR.\u00a0If an attacker does not enter any value for a specific URL parameter, NULL pointer references will occur and the NVR will reboot.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:36.000000Z"}, {"uuid": "a466dfac-a12e-4779-8ecb-2b360a2976c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41883", "type": "seen", "source": "https://t.me/cvedetector/13566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41883 - \"Vivotek NVR Remote Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-41883 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the   \n  \nNVR  \n  \n.\u00a0An attacker enters a special value for a specific URL parameter, resulting in a NULL pointer reference and a reboot of the NVR.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:44.000000Z"}, {"uuid": "143e1244-4332-45d3-8f45-6bb7f9b58980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41882", "type": "seen", "source": "https://t.me/cvedetector/13565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41882 - Hikvision NVR Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41882 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR.\u00a0An attacker can cause a stack overflow by entering large data into URL parameters, which will result in a system reboot.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:43.000000Z"}, {"uuid": "75a20d1a-b8ed-4f9c-9116-7aa127bb4b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41885", "type": "seen", "source": "https://t.me/cvedetector/13560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41885 - Hikvision NVR Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41885 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR.\u00a0The seed string for the encrypt key was hardcoding.\u00a0The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:37.000000Z"}, {"uuid": "04ec4520-7e90-46ae-9005-a037a8d9a85c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41889", "type": "seen", "source": "https://t.me/CyberBulletin/269", "content": "\u26a1Pimax VR Security Breach: Hackers Could Exploit CVE-2024-41889 to Take Control.\n\n#CyberBulletin", "creation_timestamp": "2024-08-06T09:23:58.000000Z"}, {"uuid": "9a61b489-2da1-42f8-8bc4-e7aa65b15dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41880", "type": "seen", "source": "https://t.me/cvedetector/1474", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41880 - Veilid Veilid-Core Ping Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41880 \nPublished : July 22, 2024, 7:15 p.m. | 37\u00a0minutes ago \nDescription : In veilid-core in Veilid before 0.3.4, the protocol's ping function can be misused in a way that decreases the effectiveness of safety and private routes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T22:00:43.000000Z"}, {"uuid": "03345a6b-5114-40f3-adb0-9de1c646757e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4188", "type": "seen", "source": "https://t.me/cvedetector/2038", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4188 - OpenText Documentum Server Unprotected Credential Transport License Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-4188 \nPublished : July 30, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Unprotected Transport of Credentials vulnerability in OpenText\u2122 Documentum\u2122 Server could allow Credential Stuffing.This issue affects Documentum\u2122 Server: from 16.7 through 23.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T18:15:07.000000Z"}, {"uuid": "5e2781cb-bed1-48da-990f-e94cedbb5880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41889", "type": "seen", "source": "https://t.me/cvedetector/2430", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41889 - Pimax WebSocket Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-41889 \nPublished : Aug. 5, 2024, 5:15 a.m. | 45\u00a0minutes ago \nDescription : Multiple Pimax products accept WebSocket connections from unintended endpoints. If this vulnerability is exploited, arbitrary code may be executed by a remote unauthenticated attacker. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T08:03:08.000000Z"}, {"uuid": "c6168faa-f7c0-4419-9fba-75ac2df60aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41881", "type": "seen", "source": "https://t.me/cvedetector/1831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41881 - Apache SDoP XML Infiltration Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-41881 \nPublished : July 29, 2024, 9:15 a.m. | 35\u00a0minutes ago \nDescription : SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T12:06:47.000000Z"}, {"uuid": "f1e8675d-3ae5-4c54-9236-2eabf1262795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41889", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/8805", "content": "\u200aPimax VR Security Breach: Hackers Could Exploit CVE-2024-41889 to Take Control\n\nhttps://securityonline.info/pimax-vr-security-breach-hackers-could-exploit-cve-2024-41889-to-take-control/", "creation_timestamp": "2024-08-06T10:50:28.000000Z"}]}