{"vulnerability": "CVE-2024-4242", "sightings": [{"uuid": "37b34af7-11d9-484f-ae89-abbcc53f2912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42422", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113588901021092545", "content": "", "creation_timestamp": "2024-12-03T12:31:21.209675Z"}, {"uuid": "8fa7e627-023a-4674-a2ea-6e3c86de2b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42422", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113593103381592915", "content": "", "creation_timestamp": "2024-12-04T06:20:05.591720Z"}, {"uuid": "79cff145-2f9d-4549-a9cb-41ce9adfe071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42420", "type": "seen", "source": "https://t.me/cvedetector/8903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42420 - Sharp Toshiba Tec MFPs SOAP Message Processing Out-of-bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42420 \nPublished : Oct. 25, 2024, 7:15 a.m. | 39\u00a0minutes ago \nDescription : Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.  \nCrafted HTTP requests may cause affected products crashed. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T10:23:38.000000Z"}, {"uuid": "c4b6b735-081d-4e08-880b-d01a4b5c82ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42426", "type": "seen", "source": "https://t.me/cvedetector/12407", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42426 - Dell PowerScale OneFS Uncontrolled Resource Consumption Remote Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42426 \nPublished : Dec. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Dell PowerScale OneFS Versions 9.5.0.x through 9.8.0.x contain an uncontrolled resource consumption vulnerability. A low privilege remote attacker could potentially exploit this vulnerability, leading to denial of service. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T17:12:43.000000Z"}, {"uuid": "182ac7ef-45e0-4c61-9331-1fc794bc3f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42422", "type": "seen", "source": "https://t.me/cvedetector/11882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42422 - Dell NetWorker Authorization Bypass Through User-Controlled Key Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-42422 \nPublished : Dec. 3, 2024, 1:15 p.m. | 29\u00a0minutes ago \nDescription : Dell NetWorker, version(s) 19.10, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T14:49:41.000000Z"}, {"uuid": "54879a75-3be8-4a0f-a097-74daa5b587a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42423", "type": "seen", "source": "https://t.me/cvedetector/5244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42423 - Citrix Workspace App Incorrect Authorization Vulnerability on Dell ThinOS\", \n  \"Content\": \"CVE ID : CVE-2024-42423 \nPublished : Sept. 10, 2024, 3:15 p.m. | 45\u00a0minutes ago \nDescription : Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T18:25:14.000000Z"}, {"uuid": "30c3fa6e-5c18-4dee-b2d8-b620f9b5d3cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42427", "type": "seen", "source": "https://t.me/cvedetector/5185", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42427 - Dell ThinOS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-42427 \nPublished : Sept. 10, 2024, 8:15 a.m. | 27\u00a0minutes ago \nDescription : Dell ThinOS versions 2402 and 2405, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with physical access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T10:53:03.000000Z"}, {"uuid": "6f2e8f6f-10f5-44f8-92cf-da3a78dc911a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42424", "type": "seen", "source": "https://t.me/cvedetector/5184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42424 - Dell Precision Rack BIOS Improper Input Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42424 \nPublished : Sept. 10, 2024, 8:15 a.m. | 27\u00a0minutes ago \nDescription : Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T10:52:59.000000Z"}, {"uuid": "9e80e33b-8420-4430-9c2f-9260fc75cf9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42425", "type": "seen", "source": "https://t.me/cvedetector/5200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42425 - Dell Precision Rack Access of Memory Location After End of Buffer\", \n  \"Content\": \"CVE ID : CVE-2024-42425 \nPublished : Sept. 10, 2024, 9:15 a.m. | 17\u00a0minutes ago \nDescription : Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T11:43:24.000000Z"}]}