{"vulnerability": "CVE-2024-4801", "sightings": [{"uuid": "b3cdcf15-3d01-4dd5-8ac8-ce277a4af019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48019\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.\n\n\nApplication administrators can read arbitrary\nfiles from the server filesystem through path traversal.\n\n\nUsers are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.\n\ud83d\udccf Published: 2025-02-04T21:32:28Z\n\ud83d\udccf Modified: 2025-02-08T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-48019\n2. https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr\n3. http://www.openwall.com/lists/oss-security/2025/02/04/2", "creation_timestamp": "2025-02-08T01:04:11.000000Z"}, {"uuid": "b7769f45-b8ac-4838-bc4a-f6b77f88e4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48017", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7849", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48017\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution.\n\ud83d\udccf Published: 2025-03-17T17:23:43.160Z\n\ud83d\udccf Modified: 2025-03-17T18:54:35.691Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T19:48:05.000000Z"}, {"uuid": "dd27ef13-0e8e-41f8-a6dc-9d745737cd09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7893", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48013\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.\n\ud83d\udccf Published: 2025-03-17T16:45:55.160Z\n\ud83d\udccf Modified: 2025-03-18T03:55:19.428Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-18T04:47:47.000000Z"}, {"uuid": "22271f93-01ca-4653-a488-3f6e4cd6b561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48015", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7848", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48015\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.\n\ud83d\udccf Published: 2025-03-17T17:16:55.661Z\n\ud83d\udccf Modified: 2025-03-17T18:55:02.520Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T19:48:04.000000Z"}, {"uuid": "736bd104-1350-41e9-8bf0-d48ec52c92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48017", "type": "seen", "source": "https://t.me/cvedetector/20517", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48017 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48017 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:49.000000Z"}, {"uuid": "a2f253e2-0d71-429b-b2b8-65e1d7450d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://t.me/cvedetector/20496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48013 - Dell SmartFabric OS10 Execution with Unnecessary Privileges Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48013 \nPublished : March 17, 2025, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T19:08:48.000000Z"}, {"uuid": "a21b5eb3-0497-45ea-86d7-c9869de8db09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://t.me/cvedetector/17241", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48019 - Apache Doris Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48019 \nPublished : Feb. 4, 2025, 7:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris.  \n  \n  \nApplication administrators can read arbitrary  \nfiles from the server filesystem through path traversal.  \n  \n  \nUsers are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-04T22:15:27.000000Z"}, {"uuid": "bdbd371a-aefc-4f73-ab62-50504b4842ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhereymg5y2j", "content": "", "creation_timestamp": "2025-02-04T19:15:45.718926Z"}, {"uuid": "ae191080-8473-419f-af24-9fdc6640940a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114178900806281160", "content": "", "creation_timestamp": "2025-03-17T17:16:03.107627Z"}, {"uuid": "89438a03-3b7b-4230-b177-78ec441ddb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkltwz52r72s", "content": "", "creation_timestamp": "2025-03-17T19:05:50.730317Z"}, {"uuid": "64519225-b731-4030-90b8-ece0fc3deab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48014", "type": "seen", "source": "https://gist.github.com/Darkcrai86/6412fbfbb169371ab232afc4ebab29a3", "content": "", "creation_timestamp": "2025-09-25T16:39:10.000000Z"}, {"uuid": "d186f653-626f-43bb-8a6e-03e0365f27a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48015", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:31.000000Z"}, {"uuid": "40bde1ac-aa46-4a7d-83fb-c5c9cb79e7ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4801", "type": "seen", "source": "Telegram/ku9t77UfCMRDXu5tdQvJGVCdntBX5Hy2ZScGi9objsOuGPo9", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}, {"uuid": "ae520596-eb9d-4b25-a0ce-ad7d0fe744bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48015", "type": "seen", "source": "https://t.me/cvedetector/20516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48015 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48015 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:48.000000Z"}, {"uuid": "12a63ad3-d806-43ee-b3fb-874de8e8f74f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48010", "type": "seen", "source": "https://t.me/cvedetector/10152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48010 - Dell PowerProtect DD Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48010 \nPublished : Nov. 8, 2024, 3:15 a.m. | 46\u00a0minutes ago \nDescription : Dell PowerProtect DD, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an access control vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to escalation of privilege on the application. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T05:29:03.000000Z"}, {"uuid": "1f9db336-9348-4bdf-9cbe-8b7a3375a4e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48011", "type": "seen", "source": "https://t.me/cvedetector/10151", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48011 - Dell PowerProtect DD Exposed Sensitive Information Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48011 \nPublished : Nov. 8, 2024, 3:15 a.m. | 46\u00a0minutes ago \nDescription : Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T05:29:02.000000Z"}, {"uuid": "bda83a3f-3a3c-448e-ac20-dc8b885a7916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48016", "type": "seen", "source": "https://t.me/cvedetector/8332", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48016 - Dell Secure Connect Gateway Broken Cryptography Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-48016 \nPublished : Oct. 18, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. The attacker may be able to use exposed credentials to access the system with privileges of the compromised account. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T20:15:42.000000Z"}, {"uuid": "4653b6b7-948e-4038-afda-613964829e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48011", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113444998482534569", "content": "", "creation_timestamp": "2024-11-08T02:35:02.560034Z"}, {"uuid": "83e38202-ac43-4c0a-b16e-bd097ecf73df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48010", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445121126733694", "content": "", "creation_timestamp": "2024-11-08T03:06:13.920053Z"}, {"uuid": "8d672732-922e-4d1c-b9fb-d3d61168dffc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48019", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhehjt2dre24", "content": "", "creation_timestamp": "2025-02-04T16:19:29.871244Z"}, {"uuid": "1a78fab3-359b-4065-a87c-c651dc050887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114179028517725078", "content": "", "creation_timestamp": "2025-03-17T17:48:32.218185Z"}, {"uuid": "3528aa6e-8747-4f60-9626-3972cd0f2960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48013", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.265429Z"}, {"uuid": "dfa2c877-762c-45de-a369-d274ba3106e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48015", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.481903Z"}, {"uuid": "177e862e-218f-4405-8fe3-e9bedca964b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48017", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.551165Z"}, {"uuid": "79711855-408d-4a98-af5a-dd347c19a6e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48015", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}]}