{"vulnerability": "cve-2024-4285", "sightings": [{"uuid": "e9da8ddf-e638-4298-bc24-49c73a7ed5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4285", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhultcfeqi2x", "content": "", "creation_timestamp": "2025-02-11T02:18:58.565614Z"}, {"uuid": "dd743adc-0897-4309-9074-ce62605fa2f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42852", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-42852.yaml", "content": "", "creation_timestamp": "2025-07-16T13:29:15.000000Z"}, {"uuid": "c3d91d7c-5ca7-4115-bc7c-6bbed37a3694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42852", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdlyhnn23", "content": "", "creation_timestamp": "2025-07-17T21:02:26.437684Z"}, {"uuid": "b80b2383-e295-46aa-bbd2-65fcc039d96f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42852", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwa7hpfdel2n", "content": "", "creation_timestamp": "2025-08-12T21:02:27.256334Z"}, {"uuid": "d65ca41b-94e2-4361-a1ba-aaf3b2451fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42851", "type": "seen", "source": "https://t.me/cvedetector/4265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42851 - Adobe ExifTags Buffer Overflow Vulnerability Allow Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-42851 \nPublished : Aug. 27, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-27T20:44:25.000000Z"}, {"uuid": "bae8f60a-846b-4a75-8e20-60abf0593492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42850", "type": "seen", "source": "https://t.me/cvedetector/3362", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42850 - Silverpeas Password Complexity Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-42850 \nPublished : Aug. 16, 2024, 7:15 p.m. | 38\u00a0minutes ago \nDescription : An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T22:05:05.000000Z"}, {"uuid": "adaa2c97-7b98-4d58-b66c-72fb18c1872c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42852", "type": "seen", "source": "https://t.me/cvedetector/4036", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42852 - AcuToWeb Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-42852 \nPublished : Aug. 23, 2024, 6:15 p.m. | 40\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in AcuToWeb server v.10.5.0.7577C8b allows a remote attacker to execute arbitrary code via the index.php component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T21:19:09.000000Z"}]}