{"vulnerability": "CVE-2024-4251", "sightings": [{"uuid": "8ca80715-1780-4a9a-8c69-0e91a2339e26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981019836582302", "content": "", "creation_timestamp": "2025-02-10T18:32:19.277314Z"}, {"uuid": "e1a96c29-d8aa-45e7-8c62-49ecb874dcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981054928873877", "content": "", "creation_timestamp": "2025-02-10T18:41:15.667035Z"}, {"uuid": "c6b21480-fab3-4b80-b440-89e97597996a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu73mtoy2q", "content": "", "creation_timestamp": "2025-02-10T19:16:04.798089Z"}, {"uuid": "537956b0-55ad-447c-adbc-74b611a59f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu76itnd2v", "content": "", "creation_timestamp": "2025-02-10T19:16:08.247901Z"}, {"uuid": "1eea7f40-7465-4919-8007-339ff9606076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5wh375m2o", "content": "", "creation_timestamp": "2025-02-10T22:10:12.073709Z"}, {"uuid": "37e1d874-c03b-47dd-99ce-c26cbda6557a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113982028585144519", "content": "", "creation_timestamp": "2025-02-10T22:48:52.375762Z"}, {"uuid": "9084f7af-c0e9-4d05-8e5a-d2adf5578720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114143898401599829", "content": "", "creation_timestamp": "2025-03-11T12:54:29.614512Z"}, {"uuid": "cb1738a0-36b0-4881-aeb7-1a7d5e55f64f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114143898401599829", "content": "", "creation_timestamp": "2025-03-11T12:54:29.653860Z"}, {"uuid": "63343e0d-eb7f-4847-bfff-e4d10b37ac68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ltmwivtesf2h", "content": "", "creation_timestamp": "2025-07-10T18:11:06.796440Z"}, {"uuid": "05415468-5bee-464b-b2c1-cf84615cddf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-09", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "526a3c0e-7d94-4e0b-9e92-3cb6a1d98d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-09", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "b0380e10-26ee-4635-a26d-b1aec92284fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3ltnpxyrxfk2s", "content": "", "creation_timestamp": "2025-07-11T01:46:55.746179Z"}, {"uuid": "a8378276-49c2-41b4-9c9b-5f1711863005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltq2j4pfqc2o", "content": "", "creation_timestamp": "2025-07-12T00:00:45.456007Z"}, {"uuid": "c218409b-84b9-45ce-9f77-542845113f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114830011674092966", "content": "", "creation_timestamp": "2025-07-10T17:02:07.142861Z"}, {"uuid": "149fd54d-be88-4b51-af79-acaa431ff4b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/21", "content": "", "creation_timestamp": "2025-07-10T15:37:24.000000Z"}, {"uuid": "5b5012da-0382-4839-a00c-2c3d3de99ac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q3/20", "content": "", "creation_timestamp": "2025-07-10T14:55:23.000000Z"}, {"uuid": "c8ca7770-8c36-4a1d-a61a-919dd4a833f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://gist.github.com/stanibaj/aca57b96987bd71f710831ed1f45b8a9", "content": "", "creation_timestamp": "2026-04-14T17:23:42.000000Z"}, {"uuid": "8d90309b-48a0-4a35-85a9-f1df35819c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "4bfecbea-1d7f-41e3-b6e0-142cfe7c4ee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://gist.github.com/stanibaj/b9432d60d00ca372cc2cfc88f4bff31b", "content": "", "creation_timestamp": "2026-04-19T14:35:21.000000Z"}, {"uuid": "242e30cd-98e8-4695-b845-31f0364c8ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42515", "type": "seen", "source": "https://t.me/cvedetector/9531", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42515 - Apache Glossarizer Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42515 \nPublished : Oct. 31, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., ), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T21:07:29.000000Z"}, {"uuid": "33f1d07f-226f-4365-ba29-dc3561ea8db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42516", "type": "seen", "source": "https://gist.github.com/stanibaj/9c1b6c8cb546658ba97b0f661fddf7f9", "content": "", "creation_timestamp": "2026-04-18T17:28:14.000000Z"}, {"uuid": "3b7f7d54-c5ca-468b-adf2-bcee6da1203c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42513", "type": "seen", "source": "https://t.me/cvedetector/17592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42513 - OPC UA .NET Standard Stack Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-42513 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when using HTTPS endpoints. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:40.000000Z"}, {"uuid": "b228145e-6b0e-4eb1-b4c0-464e9294688d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42512", "type": "seen", "source": "https://t.me/cvedetector/17599", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42512 - OPC UA .NET Standard Stack Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-42512 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when the deprecated Basic128Rsa15 security policy is enabled. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:49.000000Z"}, {"uuid": "3a5d5ceb-5bf8-4fbc-8aaf-d3d327e2644b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42514", "type": "seen", "source": "https://t.me/cvedetector/6788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42514 - Mitel MiContact Center Business Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42514 \nPublished : Oct. 1, 2024, 7:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.1.0.4 could allow an unauthenticated attacker to conduct an unauthorized access attack due to inadequate access control checks. A successful exploit could allow an attacker to access sensitive information and send unauthorized messages. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T21:57:38.000000Z"}]}