{"vulnerability": "CVE-2024-4197", "sightings": [{"uuid": "48072e9c-e4e9-4973-b915-6160b3816759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41971", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503201048223194", "content": "", "creation_timestamp": "2024-11-18T09:16:43.346302Z"}, {"uuid": "09b7f50d-6f6e-44f6-81bd-5b4caeea059e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41972", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503201064320976", "content": "", "creation_timestamp": "2024-11-18T09:16:43.547504Z"}, {"uuid": "29ba4321-a18e-49aa-b3d7-f21079f71c64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41974", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503260101000470", "content": "", "creation_timestamp": "2024-11-18T09:31:44.361437Z"}, {"uuid": "cac88cfb-378c-4f05-b07e-dc8b867b90f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41973", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503201077989661", "content": "", "creation_timestamp": "2024-11-18T09:16:43.798136Z"}, {"uuid": "f77ed0db-909a-44d7-9509-786da01774e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41970", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503201032836170", "content": "", "creation_timestamp": "2024-11-18T09:16:43.088313Z"}, {"uuid": "8f2d976d-a2fe-471f-9526-001498b8c27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41975", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114183639798780722", "content": "", "creation_timestamp": "2025-03-18T13:21:14.575664Z"}, {"uuid": "3635edd9-7658-41b1-8aae-b51bb6d3a0a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41973", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "0d4d3284-33d5-4040-89b2-889e6d029d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41979", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "901671db-cc2c-49b6-ae1f-2db33535461c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41970", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "c5734d06-201c-4ef8-9199-273207595529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41974", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "cd568cad-a921-464d-abe2-efd5d1e8286c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41971", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "2ae4c915-b784-4099-8a63-1c2dc56570ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41975", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkntrub6lo24", "content": "", "creation_timestamp": "2025-03-18T14:08:19.097206Z"}, {"uuid": "d2b50aee-c52f-4415-b72b-9e2ff223805e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41974", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m6foorzzec2e", "content": "", "creation_timestamp": "2025-11-24T20:39:43.616290Z"}, {"uuid": "5138a224-3d51-4f53-a0a8-0bc5dd6f7806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41972", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "9277b0f1-c130-42f7-bb55-26ae97b4b06a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41977", "type": "seen", "source": "https://t.me/cvedetector/2969", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41977 - Siemens Ruggedcom and Scalance Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41977 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions Severity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:14:57.000000Z"}, {"uuid": "d13c1a26-3142-4da4-a62e-1940bdc4e5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41973", "type": "seen", "source": "https://t.me/cvedetector/11315", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41973 - Oracle WebLogic Server Local File Write\", \n  \"Content\": \"CVE ID : CVE-2024-41973 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A low privileged remote attacker can\u00a0specify an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file writes with root privileges. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:03.000000Z"}, {"uuid": "f298972b-55e5-4768-a71e-c32438f97757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41978", "type": "seen", "source": "https://t.me/cvedetector/2971", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41978 - Siemens RUGGEDCOM and SCALANCE Device 2FA Token Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41978 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions Severity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:14:59.000000Z"}, {"uuid": "43474e04-ca92-465c-ad24-38da68bc21b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41975", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-163", "content": "", "creation_timestamp": "2026-02-24T19:30:01.000000Z"}, {"uuid": "91884b09-69ed-43b0-9618-dc3af81f0f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41975", "type": "seen", "source": "https://t.me/cvedetector/20562", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41975 - ABB PLC Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-41975 \nPublished : March 18, 2025, 11:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : An unauthenticated remote attacker can gain limited information of the PLC network but the user management of the PLCs prevents the actual access to the PLCs. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T13:33:34.000000Z"}, {"uuid": "ac898044-727e-4851-80ee-5679da783b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41974", "type": "seen", "source": "https://t.me/cvedetector/11316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41974 - Honeywell BACNet Service Property Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41974 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A low privileged remote attacker\u00a0may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:04.000000Z"}, {"uuid": "6f5f8231-a3fa-4c7d-9ee6-b087cb3230bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41972", "type": "seen", "source": "https://t.me/cvedetector/11322", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41972 - Apache File Overwrite Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41972 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A low privileged remote attacker can\u00a0overwrite an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file read with root privileges. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:15.000000Z"}, {"uuid": "03ad9064-19f9-4299-b048-bf1b2e78c44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41971", "type": "seen", "source": "https://t.me/cvedetector/11320", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41971 - Cisco Router File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41971 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:10.000000Z"}, {"uuid": "b16bc18d-16a2-408c-88f3-6bcee7d8cd1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41970", "type": "seen", "source": "https://t.me/cvedetector/11319", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41970 - Citrix Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41970 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A low privileged remote attacker\u00a0may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:10.000000Z"}, {"uuid": "5d22a16d-e394-4b2d-854d-d75f4e220cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41976", "type": "seen", "source": "https://t.me/cvedetector/2968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41976 - Siemens SCALANCE and RUGGEDCOM Routing Devices Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41976 \nPublished : Aug. 13, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions Severity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T11:14:56.000000Z"}, {"uuid": "911ed7e0-e150-4bf8-88b6-95fbdbdf27cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4197", "type": "seen", "source": "https://t.me/HackingInsights/4011", "content": "\u200aAvaya IP Office Users Urged to Patch Critical Flaws (CVE-2024-4196 &amp; CVE-2024-4197)\n\nhttps://securityonline.info/avaya-ip-office-users-urged-to-patch-critical-flaws-cve-2024-4196-cve-2024-4197/", "creation_timestamp": "2024-06-28T16:04:42.000000Z"}]}