{"vulnerability": "CVE-2024-4369", "sightings": [{"uuid": "820acb32-5b75-4d71-9c53-bbdbbb7adb8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43698", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05", "content": "", "creation_timestamp": "2024-10-17T12:00:00.000000Z"}, {"uuid": "3ebedd02-fe6a-4088-b578-79d524ca78d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43697", "type": "seen", "source": "https://t.me/cvedetector/7310", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43697 - OpenHarmony DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43697 \nPublished : Oct. 8, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T07:01:10.000000Z"}, {"uuid": "7ff760eb-6e32-4819-87c1-0149a2ca5ab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43698", "type": "seen", "source": "https://t.me/cvedetector/8667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43698 - Kieback &amp; Peter's DDC4000 series Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-43698 \nPublished : Oct. 22, 2024, 10:15 p.m. | 22\u00a0minutes ago \nDescription : Kieback &amp; Peter's DDC4000 series\u00a0uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-23T00:40:05.000000Z"}, {"uuid": "56099523-7357-4443-aab2-b117b21829c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43696", "type": "seen", "source": "https://t.me/cvedetector/7309", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43696 - Apache OpenHarmony Memory Leak DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43696 \nPublished : Oct. 8, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T07:01:09.000000Z"}, {"uuid": "34b3ab57-bc71-463b-8571-badd181ebfc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43699", "type": "seen", "source": "https://t.me/cvedetector/6939", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43699 - Delta Electronics DIAEnergie SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-43699 \nPublished : Oct. 3, 2024, 11:15 p.m. | 33\u00a0minutes ago \nDescription : Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An unauthenticated attacker may be able to exploit this issue to obtain records contained in the targeted product. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T01:49:08.000000Z"}, {"uuid": "884c8013-5b84-461f-b904-9306ecef8fbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43690", "type": "seen", "source": "https://t.me/cvedetector/5333", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43690 - Schneider Electric Command Centre Untrusted Control Sphere Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-43690 \nPublished : Sept. 11, 2024, 5:15 a.m. | 24\u00a0minutes ago \nDescription : Inclusion of Functionality from Untrusted Control Sphere(CWE-829) in the Command Centre Server and Workstations may allow an attacker to perform Remote Code Execution (RCE).  \n  \nThis issue affects: Command Centre Server and Command Centre Workstations\u00a09.10 prior to vEL9.10.1530 (MR2), 9.00 prior to vEL9.00.2168 (MR4), 8.90 prior to vEL8.90.2155 (MR5), 8.80 prior to vEL8.80.1938 (MR6), all versions of 8.70 and prior. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T07:48:56.000000Z"}]}