{"vulnerability": "cve-2024-4662", "sightings": [{"uuid": "7e225f4a-79e6-4b17-a0c1-48d3b89e14d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46625", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113591173004315447", "content": "", "creation_timestamp": "2024-12-03T22:09:08.715362Z"}, {"uuid": "a668fd1a-bf2a-4c78-9a39-cfb3325a7400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46624", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113591220208835801", "content": "", "creation_timestamp": "2024-12-03T22:21:09.053545Z"}, {"uuid": "494247c3-0ee2-4782-b37e-0fe4f7127260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfcc44jiv52l", "content": "", "creation_timestamp": "2025-01-09T08:46:38.960707Z"}, {"uuid": "a798a3d8-4448-4eff-83d8-ea2d3dd3b848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfboj3bsdt2z", "content": "", "creation_timestamp": "2025-01-09T02:55:59.135592Z"}, {"uuid": "a88a0acb-4b46-4d2a-8e6f-f403694361cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782729477665790", "content": "", "creation_timestamp": "2025-01-06T18:04:28.505686Z"}, {"uuid": "9c908542-63fa-44e6-b391-ea564c6ed947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfa5fgnocs2a", "content": "", "creation_timestamp": "2025-01-08T12:17:08.446002Z"}, {"uuid": "328b8f6c-d2b9-4e60-97d6-0a58b7f2313d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3qj2sqg622", "content": "", "creation_timestamp": "2025-01-06T18:15:47.173719Z"}, {"uuid": "ff52e98a-70ec-4709-8e80-cee717ddeca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3s2n7vk32k", "content": "", "creation_timestamp": "2025-01-06T18:43:31.099023Z"}, {"uuid": "d57b241d-accc-4778-8dc9-3b8016954e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-46622", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfc3jrqhz22j", "content": "", "creation_timestamp": "2025-01-09T06:49:01.206989Z"}, {"uuid": "7035293e-8fc1-455a-bfbe-17d5fec32dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46622", "type": "seen", "source": "https://t.me/cvedetector/14400", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46622 - SecureAge Security Suite Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46622 \nPublished : Jan. 6, 2025, 6:15 p.m. | 44\u00a0minutes ago \nDescription : An Escalation of Privilege security vulnerability was found in SecureAge Security Suite software 7.0.x before 7.0.38, 7.1.x before 7.1.11, 8.0.x before 8.0.18, and 8.1.x before 8.1.18 that allows arbitrary file creation, modification and deletion. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T20:17:40.000000Z"}, {"uuid": "7f25c0b0-d55c-4379-b78e-6aefe56bca2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46627", "type": "seen", "source": "https://t.me/cvedetector/6430", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46627 - BECN DATAGERRY Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46627 \nPublished : Sept. 26, 2024, 5:15 p.m. | 22\u00a0minutes ago \nDescription : Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T19:40:32.000000Z"}, {"uuid": "063eeda1-5409-4713-bcef-ec1fb7669741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46626", "type": "seen", "source": "https://t.me/cvedetector/6843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46626 - OpenSIS-Classic SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46626 \nPublished : Oct. 2, 2024, 5:15 p.m. | 23\u00a0minutes ago \nDescription : OS4ED openSIS-Classic v9.1 was discovered to contain a SQL injection vulnerability via a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T19:42:27.000000Z"}, {"uuid": "d9d10718-6ebe-4a43-86c4-f8f36d596aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46628", "type": "seen", "source": "https://t.me/cvedetector/6459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46628 - Tenda G3 Router Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46628 \nPublished : Sept. 26, 2024, 8:15 p.m. | 46\u00a0minutes ago \nDescription : Tenda G3 Router firmware v15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the usbPartitionName parameter in the formSetUSBPartitionUmount function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T23:01:43.000000Z"}, {"uuid": "a6a8a83a-06bc-4e79-8b30-d6b48dae48ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46626", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctf7arz23", "content": "", "creation_timestamp": "2025-04-04T21:02:07.834721Z"}, {"uuid": "0ae32b67-ceb4-40b8-abf0-874ed9f8a78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46627", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8595", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to &gt; execute arbitrary commands via crafted web requests.\nURL\uff1ahttps://github.com/d4lyw/CVE-2024-46627\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-25T10:36:54.000000Z"}, {"uuid": "142c6e48-2b96-4d9e-ac37-2b403bf7bbcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46624", "type": "seen", "source": "https://t.me/cvedetector/11922", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46624 - An issue in InfoDom Performa 365 v4.0.1 allows aut\", \n  \"Content\": \"CVE ID : CVE-2024-46624 \nPublished : Dec. 3, 2024, 11:15 p.m. | 28\u00a0minutes ago \nDescription : An issue in InfoDom Performa 365 v4.0.1 allows authenticated attackers to elevate their privileges to Administrator via a crafted payload sent to /api/users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T00:51:38.000000Z"}, {"uuid": "70a06e86-3162-42b5-bcdd-59be2d9510b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46625", "type": "seen", "source": "https://t.me/cvedetector/11921", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46625 - An authenticated arbitrary file upload vulnerabili\", \n  \"Content\": \"CVE ID : CVE-2024-46625 \nPublished : Dec. 3, 2024, 10:15 p.m. | 41\u00a0minutes ago \nDescription : An authenticated arbitrary file upload vulnerability in the /documentCache/upload endpoint of InfoDom Performa 365 v4.0.1 allows attackers to execute arbitrary code via uploading a crafted SVG file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T00:01:30.000000Z"}]}