{"vulnerability": "CVE-2024-4190", "sightings": [{"uuid": "ece1fc81-d366-4aca-80b6-efb3c4134896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41902", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-07", "content": "", "creation_timestamp": "2024-10-10T12:00:00.000000Z"}, {"uuid": "b1fe721e-3895-4d4d-8fb5-a32a60f50774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41908", "type": "seen", "source": "https://t.me/cvedetector/2972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41908 - NX PRT Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41908 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in NX (All versions Severity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:00.000000Z"}, {"uuid": "55d64372-c1cb-4dd5-9e2e-c111184404c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41909", "type": "seen", "source": "https://t.me/cvedetector/2863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41909 - Apache MINA SSHD Terrapin Attack\", \n  \"Content\": \"CVE ID : CVE-2024-41909 \nPublished : Aug. 12, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which   \nsome security features have been downgraded or disabled, aka a Terrapin   \nattack  \n  \nThe mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T19:17:38.000000Z"}, {"uuid": "420b882d-3156-4f54-8432-deae382b5e8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41907", "type": "seen", "source": "https://t.me/cvedetector/2978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41907 - SINEC Traffic Analyzer HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41907 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions Severity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:12.000000Z"}, {"uuid": "ff0e3878-3245-4ad2-8495-a8d87397f439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41906", "type": "seen", "source": "https://t.me/cvedetector/2977", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41906 - SINEC Traffic Analyzer HTTP Cache Poisoning Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41906 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions Severity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:08.000000Z"}, {"uuid": "f3a89282-4da9-42ee-8523-d06baaf3918d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41904", "type": "seen", "source": "https://t.me/cvedetector/2976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41904 - \"SINEC Traffic Analyzer Authentication Brute Force Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-41904 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions Severity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:07.000000Z"}, {"uuid": "ab809aad-106a-4522-94f2-12468f85703b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41903", "type": "seen", "source": "https://t.me/cvedetector/2982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41903 - SINEC Traffic Analyzer Container Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-41903 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions Severity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:16.000000Z"}, {"uuid": "d60511ed-ae6e-445d-bf89-c2301da79437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41905", "type": "seen", "source": "https://t.me/cvedetector/2979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41905 - SINEC Traffic Analyzer File Access Control Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41905 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions Severity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:15:13.000000Z"}]}