{"vulnerability": "CVE-2024-45711", "sightings": [{"uuid": "968d23cb-e97c-4457-b5b5-2615d6f3d4c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45711", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0421", "content": "", "creation_timestamp": "2024-10-18T09:10:48.000000Z"}, {"uuid": "09a043fc-aa0e-47c0-b1ff-d0514aea12b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45711", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-406/", "content": "", "creation_timestamp": "2025-06-17T03:00:00.000000Z"}, {"uuid": "4c3b884c-e2ec-401a-b7c8-318c2cde57fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45711", "type": "seen", "source": "https://t.me/cvedetector/8028", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45711 - SolarWinds Serv-U Directory Traversal Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-45711 \nPublished : Oct. 16, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : SolarWinds Serv-U is vulnerable  to a directory traversal  vulnerability where remote code execution is possible depending on privileges given to the authenticated user.  This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T11:20:41.000000Z"}]}