{"vulnerability": "CVE-2024-4198", "sightings": [{"uuid": "8efb6ced-8035-49ac-b297-9ce9f9f39737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41981", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-02", "content": "", "creation_timestamp": "2024-10-10T12:00:00.000000Z"}, {"uuid": "a7afdd1a-5d52-4191-b1f3-a32b7868a74d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41981", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-06", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "bf4fe5da-2f8a-4832-bb42-9074010ea3f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41987", "type": "seen", "source": "https://t.me/cvedetector/6921", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41987 - TEM Opera Plus FM Family Transmitter Privilege Escalation (CVE-2022-1234)\", \n  \"Content\": \"CVE ID : CVE-2024-41987 \nPublished : Oct. 3, 2024, 6:15 p.m. | 27\u00a0minutes ago \nDescription : The TEM Opera Plus FM Family Transmitter application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T20:48:05.000000Z"}, {"uuid": "fed3c701-635b-4037-81a2-bd868e0d305b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41980", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "830e96b7-05af-459e-9414-a4d9b467b3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41982", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ecc0a254-b507-42cb-bec2-4ae0166dc3eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41983", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "0b8ce320-abf7-4d8a-912a-1368f75db315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41984", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "38de53e1-8c65-4a9b-8e54-b0483c1afbd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41985", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "6b51d6d2-9c61-4d47-9a5e-a742ce264bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41986", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-06", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ae7f43de-b08a-4bea-b07e-5e8772b28d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41988", "type": "seen", "source": "https://t.me/cvedetector/6918", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41988 - TEM Opera Plus FM Family Transmitter File System Binary Upload Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41988 \nPublished : Oct. 3, 2024, 6:15 p.m. | 27\u00a0minutes ago \nDescription : TEM Opera Plus FM Family Transmitter allows access to an unprotected endpoint that allows MPFS File System binary image upload without authentication. This file system serves as the basis for the HTTP2 web server module but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T20:48:03.000000Z"}, {"uuid": "0182f51e-dc30-437f-8a42-44d9a85cf3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41989", "type": "seen", "source": "https://t.me/cvedetector/2694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41989 - Django Floatformat Scientific Notation Memory Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41989 \nPublished : Aug. 7, 2024, 3:15 p.m. | 24\u00a0minutes ago \nDescription : An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T17:48:22.000000Z"}]}