{"vulnerability": "CVE-2024-45289", "sightings": [{"uuid": "74b2e0c6-0b6d-4b3c-936f-54ada3894dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45289", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113470679716254564", "content": "", "creation_timestamp": "2024-11-12T15:26:07.049967Z"}, {"uuid": "7503eab7-504c-40ab-88bf-7d86d31bb01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45289", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1138", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45289\n\ud83d\udd39 Description: The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\n\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.\n\ud83d\udccf Published: 2024-11-12T15:06:08.435Z\n\ud83d\udccf Modified: 2025-01-10T13:06:48.187Z\n\ud83d\udd17 References:\n1. https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc", "creation_timestamp": "2025-01-10T14:06:15.000000Z"}, {"uuid": "70eae709-f0ec-4da0-bf04-d817e4bdeb65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45289", "type": "seen", "source": "https://t.me/cvedetector/10620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45289 - OpenSSL Fetch CERTNAME CERT Verification Ard jclass\", \n  \"Content\": \"CVE ID : CVE-2024-45289 \nPublished : Nov. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.  \n  \nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T17:12:39.000000Z"}]}