{"vulnerability": "CVE-2024-5411", "sightings": [{"uuid": "939c92bc-23b1-403d-8ac0-7ea9d6f584bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54118", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639856685497577", "content": "", "creation_timestamp": "2024-12-12T12:30:02.713832Z"}, {"uuid": "b522321b-469a-4327-a77d-d8d7ace4b6ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54119", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639856702257931", "content": "", "creation_timestamp": "2024-12-12T12:30:03.276459Z"}, {"uuid": "96f04a05-422a-4111-b76c-6ead1477db4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54119", "type": "seen", "source": "https://t.me/cvedetector/12782", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54119 - Adobe UIExtension Cross-Process Screen Stack Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54119 \nPublished : Dec. 12, 2024, 1:15 p.m. | 23\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T14:40:20.000000Z"}, {"uuid": "e5a5afbc-98aa-44cd-a463-d426008e57e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5411", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-15", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "f8473adb-7249-47fe-909e-8f42338ae73c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54118", "type": "seen", "source": "https://t.me/cvedetector/12781", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54118 - Apache UIExtension Cross-Process Screen Stack Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-54118 \nPublished : Dec. 12, 2024, 1:15 p.m. | 23\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T14:40:19.000000Z"}, {"uuid": "ffa63bd6-e4a6-48a2-ad44-0a136770cd98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54110", "type": "seen", "source": "https://t.me/cvedetector/12775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54110 - Citrix UIExtension Cross-Process Screen Stack Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54110 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:09.000000Z"}, {"uuid": "e1627700-fec1-4a94-bd0a-27b93a35cdc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54117", "type": "seen", "source": "https://t.me/cvedetector/12769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54117 - Webroot UIExtension Cross-Process Screen Stack Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-54117 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:02.000000Z"}, {"uuid": "4ea7ad8b-e089-44cb-86e5-5c719f331bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54116", "type": "seen", "source": "https://t.me/cvedetector/12768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54116 - \"Kaltura M3U8 OOB Read Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-54116 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Out-of-bounds read vulnerability in the M3U8 module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:01.000000Z"}, {"uuid": "c3772873-2740-45f0-854b-7b042a4620f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54115", "type": "seen", "source": "https://t.me/cvedetector/12767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54115 - Apache DASH Out-of-bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54115 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Out-of-bounds read vulnerability in the DASH module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:01.000000Z"}, {"uuid": "ba8f2c2c-aee2-4d9c-87a7-24c5198fa1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54114", "type": "seen", "source": "https://t.me/cvedetector/12766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54114 - FFmpeg DASH Out-of-Bounds Access Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54114 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Out-of-bounds access vulnerability in playback in the DASH module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:00.000000Z"}, {"uuid": "58a59295-f7fd-4151-9131-4177832466fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54113", "type": "seen", "source": "https://t.me/cvedetector/12765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54113 - Microsoft Print Module Energy Consumption Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-54113 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Process residence vulnerability in abnormal scenarios in the print module  \nImpact: Successful exploitation of this vulnerability may affect power consumption. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:49:56.000000Z"}, {"uuid": "4d8a3dbd-ab21-4a74-887a-1acdc67c2806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54112", "type": "seen", "source": "https://t.me/cvedetector/12773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54112 - Adobe Illustrator Cross-process Screen Stack Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54112 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:08.000000Z"}, {"uuid": "0f364036-1dcb-4628-8909-b4a85fa8b986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54111", "type": "seen", "source": "https://t.me/cvedetector/12772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54111 - Apple Image Decoding Module Read/Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54111 \nPublished : Dec. 12, 2024, 12:15 p.m. | 32\u00a0minutes ago \nDescription : Read/Write vulnerability in the image decoding module  \nImpact: Successful exploitation of this vulnerability will affect availability. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T13:50:07.000000Z"}, {"uuid": "bcdd3624-fb41-4389-bd39-044e565f89a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5411", "type": "seen", "source": "https://t.me/HackingInsights/1004", "content": "CVE-2024-5411\nMissing input validation and OS command integration of the input in the ORing IAP-420 web-interface allows authenticated command injection.This issue affects IAP-420 version 2.01e and below.", "creation_timestamp": "2024-05-28T13:37:59.000000Z"}]}