{"vulnerability": "CVE-2024-5410", "sightings": [{"uuid": "65a5487a-a216-40e4-90fa-e2e0005c07c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54100", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639628930028460", "content": "", "creation_timestamp": "2024-12-12T11:32:07.654524Z"}, {"uuid": "5fdc4513-61e9-4bd4-a5d4-7445fcf74884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54101", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639676531469272", "content": "", "creation_timestamp": "2024-12-12T11:44:13.775734Z"}, {"uuid": "591ec3ea-8ec0-4175-a06e-14b52db5c30d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54102", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639676547841037", "content": "", "creation_timestamp": "2024-12-12T11:44:14.486613Z"}, {"uuid": "0c713502-25d7-4fe9-b9e0-668de68493af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639749791583414", "content": "", "creation_timestamp": "2024-12-12T12:02:51.655305Z"}, {"uuid": "f23011be-5ad7-4f8d-8676-79ea72013208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54104", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639749806908689", "content": "", "creation_timestamp": "2024-12-12T12:02:51.918601Z"}, {"uuid": "b6224be3-79f1-4272-8ad0-2bd1bc56effb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54105", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639749820673585", "content": "", "creation_timestamp": "2024-12-12T12:02:52.246380Z"}, {"uuid": "2b183ec0-de0b-484a-9b2b-7642d09ca5e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54106", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639749834224269", "content": "", "creation_timestamp": "2024-12-12T12:02:52.349883Z"}, {"uuid": "c8c083ff-f8f7-4b27-8efd-4ea0bb721c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54107", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639808836787547", "content": "", "creation_timestamp": "2024-12-12T12:17:54.301028Z"}, {"uuid": "94295104-c5c5-4469-9a9f-d4ef8dc5ad20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5410", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-15", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "231ac305-8ed3-4341-8e3a-bf97124675f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54105", "type": "seen", "source": "https://t.me/cvedetector/12780", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54105 - Canon Image Dissector RCE\", \n  \"Content\": \"CVE ID : CVE-2024-54105 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Read/Write vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 5.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:16.000000Z"}, {"uuid": "7e94fc4c-1dee-4320-9efe-be4bc0a517ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54106", "type": "seen", "source": "https://t.me/cvedetector/12776", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54106 - Intel Media Processor JPEG Decoding Pointer Deref Lane\", \n  \"Content\": \"CVE ID : CVE-2024-54106 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Null pointer dereference vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:13.000000Z"}, {"uuid": "7085bb5e-9ab2-4508-b7b8-1eebdafe2312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54108", "type": "seen", "source": "https://t.me/cvedetector/12774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54108 - Citrix Image Decoder Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-54108 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Read/Write vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:09.000000Z"}, {"uuid": "57228592-9b87-4442-bdda-5e5288130df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54109", "type": "seen", "source": "https://t.me/cvedetector/12771", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54109 - Adobe Photoshop Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54109 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Read/Write vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:06.000000Z"}, {"uuid": "33567a9f-8e27-4047-93c0-860cd6a01742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54104", "type": "seen", "source": "https://t.me/cvedetector/12779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54104 - VMware UIExtension Cross-Site Scripting Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-54104 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:15.000000Z"}, {"uuid": "6960138c-aad1-4000-80fb-0beb3efeb952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54103", "type": "seen", "source": "https://t.me/cvedetector/12778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54103 - Foobar Album Module Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-54103 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Vulnerability of improper access control in the album module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:15.000000Z"}, {"uuid": "525173da-2a22-4cac-9ffa-2094f611b17e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54107", "type": "seen", "source": "https://t.me/cvedetector/12777", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54107 - Microsoft Windows Image Decoding Module Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-54107 \nPublished : Dec. 12, 2024, 12:15 p.m. | 33\u00a0minutes ago \nDescription : Read/Write vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:14.000000Z"}]}