{"vulnerability": "CVE-2024-4607", "sightings": [{"uuid": "c3f18695-5a3a-496a-ac38-bd54d8ba4002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46073", "type": "seen", "source": "https://t.me/cvedetector/14399", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46073 - IceHRM Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-46073 \nPublished : Jan. 6, 2025, 6:15 p.m. | 44\u00a0minutes ago \nDescription : A reflected Cross-Site Scripting (XSS) vulnerability exists in the login page of IceHRM v32.4.0.OS. The vulnerability is due to improper sanitization of the \"next\" parameter, which is included in the application's response without adequate escaping. An attacker can exploit this flaw by tricking a user into visiting a specially crafted URL, causing the execution of arbitrary JavaScript code in the context of the victim's browser. The issue occurs even though the application has sanitization mechanisms in place. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T20:17:39.000000Z"}, {"uuid": "66919c74-411b-4bef-be99-355fe39292b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46076", "type": "seen", "source": "https://t.me/cvedetector/7255", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46076 - RuoYi SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-46076 \nPublished : Oct. 7, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T20:58:57.000000Z"}, {"uuid": "051c03e2-7d65-4fe7-97b9-3f26a64e1336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46079", "type": "seen", "source": "https://t.me/cvedetector/6785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46079 - Scriptcase XSS.Redirect sito Through Description\", \n  \"Content\": \"CVE ID : CVE-2024-46079 \nPublished : Oct. 1, 2024, 7:15 p.m. | 39\u00a0minutes ago \nDescription : Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in proj_new.php via the Descricao parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T21:57:35.000000Z"}, {"uuid": "fb43f439-e76c-4b16-87de-a10a0091ed98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46078", "type": "seen", "source": "https://t.me/cvedetector/7015", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46078 - itsourcecode Sports Management System SQL Injection - Delete Category Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46078 \nPublished : Oct. 4, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : itsourcecode Sports Management System Project 1.0 is vulnerable to SQL Injection in the function delete_category of the file sports_scheduling/player.php via the argument id. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T21:53:30.000000Z"}, {"uuid": "ea5fc106-87df-4f45-bb5b-434413832959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46077", "type": "seen", "source": "https://t.me/cvedetector/7016", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46077 - itsourcecode Online Tours and Travels Management System XSS\", \n  \"Content\": \"CVE ID : CVE-2024-46077 \nPublished : Oct. 4, 2024, 7:15 p.m. | 34\u00a0minutes ago \nDescription : itsourcecode Online Tours and Travels Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via a crafted payload to the val-username, val-email, val-suggestions, val-digits and state_name parameters in travellers.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T21:53:31.000000Z"}, {"uuid": "38b02fbc-d0bb-492f-aebd-51ba8c115b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4607", "type": "seen", "source": "https://t.me/cvedetector/2443", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4607 - Arm Ltd Bifrost/Valhall/5th Gen GPU Architecture Kernel Driver After Free Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-4607 \nPublished : Aug. 5, 2024, 12:15 p.m. | 19\u00a0minutes ago \nDescription : Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r49p0; Valhall GPU Kernel Driver: from r41p0 through r49p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T14:44:33.000000Z"}, {"uuid": "5b504094-585a-49fb-94a8-93730194c3b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46073", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782569211083494", "content": "", "creation_timestamp": "2025-01-06T17:23:43.131304Z"}, {"uuid": "1431ca3b-be3d-4cea-a22c-c0056aad3968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46078", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lxowag6lds2z", "content": "", "creation_timestamp": "2025-08-31T10:52:26.209776Z"}, {"uuid": "455c99c8-6a06-4aeb-bc20-01419e34ec77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46073", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3qiycnqj2i", "content": "", "creation_timestamp": "2025-01-06T18:15:44.755867Z"}, {"uuid": "0b9647b3-f3f8-4c74-b1d5-80740009e973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46073", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3s2nhase2q", "content": "", "creation_timestamp": "2025-01-06T18:43:32.310994Z"}]}