{"vulnerability": "CVE-2024-4647", "sightings": [{"uuid": "bf292c7e-b7ee-4014-a174-645b348df79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3met4f2wbfk22", "content": "", "creation_timestamp": "2026-02-14T13:20:36.619490Z"}, {"uuid": "4f1f0768-b0e8-4b88-b02b-f95b5b51c52e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://t.me/cvedetector/15165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46479 - Venki Supravizio BPM Remote File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46479 \nPublished : Jan. 13, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Venki Supravizio BPM through 18.0.1 was discovered to contain an arbitrary file upload vulnerability. An authenticated attacker may upload a malicious file, leading to remote code execution. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T20:25:22.000000Z"}, {"uuid": "b73b6170-5e61-4145-91fd-bf09c57be010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://t.me/cvedetector/8826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46478 - \"HTMLDOC Buffer Overflow Vulnerability in parse_pre function\"\", \n  \"Content\": \"CVE ID : CVE-2024-46478 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:19.000000Z"}, {"uuid": "99c72323-ac8e-47ec-b703-f8553796f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46472", "type": "seen", "source": "https://t.me/cvedetector/6543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46472 - CodeAstro Membership Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46472 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:22.000000Z"}, {"uuid": "9bdaef63-0ec6-4550-9e94-262e77358bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46471", "type": "seen", "source": "https://t.me/cvedetector/6542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46471 - CodeAstro Membership Management System Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46471 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:18.000000Z"}, {"uuid": "ea8dcdb4-7f85-4b8f-a65c-56de59758401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46470", "type": "seen", "source": "https://t.me/cvedetector/6541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46470 - CodeAstro Membership Management System CSRF/XXE\", \n  \"Content\": \"CVE ID : CVE-2024-46470 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in CodeAstro Membership Management System 1.0 allows attackers to run malicious JavaScript via the membership_type field in the edit-type.php component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:18.000000Z"}, {"uuid": "5de9e974-585d-4da7-917c-28cebc65d2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4647", "type": "seen", "source": "Telegram/iJ5TTHatIMBvDs1Ju3jKgMw7tjcdMSJqKvNOBAPCkOcdN71P", "content": "", "creation_timestamp": "2025-02-19T19:14:02.000000Z"}, {"uuid": "47c9d866-c140-4ae5-bf67-c9b4c15db6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpuitub252e", "content": "", "creation_timestamp": "2025-01-14T18:20:29.799210Z"}, {"uuid": "2568a17c-4d1d-4e6d-aeaa-7cb7be781b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46475", "type": "seen", "source": "https://t.me/cvedetector/6659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46475 - Metronic Admin Dashboard Template Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-46475 \nPublished : Sept. 30, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T19:09:59.000000Z"}, {"uuid": "3f955ef3-9cc9-4809-ba07-4bb451b9bb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538846167508", "content": "", "creation_timestamp": "2025-01-13T18:48:37.544880Z"}, {"uuid": "9ab15817-31f5-408b-93fe-9a5880f9bfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822351287174035", "content": "", "creation_timestamp": "2025-01-13T18:00:49.417839Z"}]}