{"vulnerability": "cve-2024-4895", "sightings": [{"uuid": "893956c4-c612-4392-b5c5-da51773cc57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48950", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442691047098937", "content": "", "creation_timestamp": "2024-11-07T16:48:14.079102Z"}, {"uuid": "2ff407d3-d215-4e99-bf4e-0b2cb53f05b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48951", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442721022835093", "content": "", "creation_timestamp": "2024-11-07T16:55:51.141352Z"}, {"uuid": "5a25dcb0-f7ae-48b2-a45f-7e6ae860b91a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48952", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442721037928941", "content": "", "creation_timestamp": "2024-11-07T16:55:51.464948Z"}, {"uuid": "9cdcb6f8-3e0a-407e-b7e5-0475ec480630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48953", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442755368101149", "content": "", "creation_timestamp": "2024-11-07T17:04:35.251261Z"}, {"uuid": "55b3e1be-1131-477e-8d58-ab5c84cfdeca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48954", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442755381889868", "content": "", "creation_timestamp": "2024-11-07T17:04:35.744132Z"}, {"uuid": "ebf66da6-74a2-4d57-b643-6b3a820953a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48956", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113624396932334370", "content": "", "creation_timestamp": "2024-12-09T18:58:25.584444Z"}, {"uuid": "fc80d568-bf61-4f42-8f44-c7a7b9f68d47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48955", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8879", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-48955_Overview\nURL\uff1ahttps://github.com/BrotherOfJhonny/CVE-2024-48955_Overview\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T13:16:25.000000Z"}, {"uuid": "79cb6dd7-6ae5-4ec5-be68-dbb7ca045adf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48956", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/254", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48956\n\ud83d\udd39 Description: Serviceware Processes 6.0 through 7.3 before 7.4 allows attackers without valid authentication to send a specially crafted HTTP request to a service endpoint resulting in remote code execution.\n\ud83d\udccf Published: 2024-12-09T00:00:00\n\ud83d\udccf Modified: 2025-01-06T21:01:19.289820Z\n\ud83d\udd17 References:\n1. https://serviceware-se.com/platform/serviceware-processes\n2. https://security.serviceware-se.com/CVE-2024-48956/", "creation_timestamp": "2025-01-06T21:38:24.000000Z"}, {"uuid": "071883c0-02ad-4226-9e35-cb6228f1ae7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48955", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48955\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied.\n\ud83d\udccf Published: 2024-10-29T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T18:37:32.449Z\n\ud83d\udd17 References:\n1. https://netadmin.software/gestao-de-identidade-e-acesso/\n2. https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview\n3. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-48955&amp;sortby=bydate", "creation_timestamp": "2025-03-18T19:02:48.000000Z"}, {"uuid": "3a71775f-a4ad-461b-8aed-6c83b05e3c2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48956", "type": "seen", "source": "https://t.me/cvedetector/12441", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48956 - Serviceware Processes Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-48956 \nPublished : Dec. 9, 2024, 7:15 p.m. | 44\u00a0minutes ago \nDescription : Serviceware Processes 6.0 through 7.3 allows attackers without valid authentication to send a specially crafted HTTP request to a service endpoint resulting in remote code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T21:24:03.000000Z"}, {"uuid": "46113a69-78d1-4235-b13b-ae57c4ee7067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48955", "type": "seen", "source": "https://t.me/cvedetector/9353", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48955 - NetAdmin Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48955 \nPublished : Oct. 29, 2024, 6:15 p.m. | 30\u00a0minutes ago \nDescription : In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T19:47:54.000000Z"}, {"uuid": "8311416d-3d02-4446-8fc2-e192e969b6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48954", "type": "seen", "source": "https://t.me/cvedetector/10103", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48954 - Logpoint EventHub Collector Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48954 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in Logpoint before 7.5.0. Unvalidated input during the EventHub Collector setup by an authenticated user leads to Remote Code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:34.000000Z"}, {"uuid": "8a773a30-154b-44ef-8efa-4217285cb8df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48952", "type": "seen", "source": "https://t.me/cvedetector/10102", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48952 - Logpoint SOAR Static JWT Secret Key Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48952 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:31.000000Z"}, {"uuid": "78ed4253-a38b-4345-8bb3-31a751288c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48951", "type": "seen", "source": "https://t.me/cvedetector/10101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48951 - Logpoint Server-Side Request Forgery and Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-48951 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in Logpoint before 7.5.0. Server-Side Request Forgery (SSRF) on SOAR can be used to leak Logpoint's API Token leading to authentication bypass. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:30.000000Z"}, {"uuid": "c61a690f-5264-4e23-9142-bef5e8763b4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48950", "type": "seen", "source": "https://t.me/cvedetector/10100", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48950 - Logpoint CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48950 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in Logpoint before 7.5.0. An endpoint used by Distributed Logpoint Setup was exposed, allowing unauthenticated attackers to bypass CSRF protections and authentication. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:29.000000Z"}, {"uuid": "28c8e29c-989f-4380-8078-ccbe386f8a4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48953", "type": "seen", "source": "https://t.me/cvedetector/10099", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48953 - Logpoint Unauthenticated Plugin Registration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48953 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered in Logpoint before 7.5.0. Endpoints for creating, editing, or deleting third-party authentication modules lacked proper authorization checks. This allowed unauthenticated users to register their own authentication plugins in Logpoint, resulting in unauthorized access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T21:28:42.000000Z"}, {"uuid": "109458bb-3de9-4863-8c34-7c03dff98423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48958", "type": "seen", "source": "https://t.me/cvedetector/7541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48958 - Libarchive Out-of-Bounds Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48958 \nPublished : Oct. 10, 2024, 2:15 a.m. | 33\u00a0minutes ago \nDescription : execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T05:02:23.000000Z"}, {"uuid": "a278e663-31f5-4bf2-b8ec-4ee487496951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48957", "type": "seen", "source": "https://t.me/cvedetector/7546", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48957 - Libarchive RAR Filter Out-of-Bounds Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48957 \nPublished : Oct. 10, 2024, 2:15 a.m. | 33\u00a0minutes ago \nDescription : execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T05:02:30.000000Z"}]}