{"vulnerability": "cve-2024-4699", "sightings": [{"uuid": "eaaee3e2-a2ba-44c9-96e4-e200cd4e4f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46999", "type": "seen", "source": "https://t.me/cvedetector/6091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46999 - Zitadel Deactivated User Grant Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-46999 \nPublished : Sept. 20, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Zitadel is an open source identity management platform. ZITADEL's user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T03:01:56.000000Z"}, {"uuid": "36c7bf09-bb58-4a77-ad81-1eb4279301a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46992", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46992\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 30.0.0-alpha.1 to before 30.0.5 and 31.0.0-alpha.1 to before 31.0.0-beta.1, Electron is vulnerable to an ASAR Integrity bypass. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are not impacted. Specifically this issue can only be exploited if the app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against. This issue has been patched in versions 30.0.5 and 31.0.0-beta.1. There are no workarounds for this issue.\n\ud83d\udccf Published: 2025-07-01T01:43:13.767Z\n\ud83d\udccf Modified: 2025-07-01T01:43:13.767Z\n\ud83d\udd17 References:\n1. https://github.com/electron/electron/security/advisories/GHSA-xw5q-g62x-2qjc\n2. https://www.electronjs.org/docs/latest/tutorial/fuses", "creation_timestamp": "2025-07-01T02:07:40.000000Z"}, {"uuid": "3a343a55-7bd2-4649-b241-21546e2a7f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46998", "type": "seen", "source": "https://t.me/cvedetector/8842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46998 - \"BaserCMS Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-46998 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in the Edit Email Form Settings Feature. Version 5.1.2 fixes the issue. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:50.000000Z"}, {"uuid": "944e94f9-b451-4340-b72d-b53c0e1dd141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46994", "type": "seen", "source": "https://t.me/cvedetector/8845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46994 - baserCMS Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-46994 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in Blog posts and Contents list Feature. Version 5.1.2 fixes this issue. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:53.000000Z"}, {"uuid": "c926d4e9-607c-49ca-abe7-596abd4452ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46995", "type": "seen", "source": "https://t.me/cvedetector/8844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46995 - BaserCMS Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46995 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in HTTP 400 Bad Request. Version 5.1.2 fixes this issue. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:52.000000Z"}, {"uuid": "a2409672-42b9-4db4-878d-b5b53e9e21e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46996", "type": "seen", "source": "https://t.me/cvedetector/8841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46996 - BaserCMS Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46996 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in the Blog posts feature. Version 5.1.2 fixes this issue. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:47.000000Z"}, {"uuid": "a551c634-8dec-49bb-964d-df63e5d5998b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46997", "type": "seen", "source": "https://t.me/cvedetector/6190", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46997 - DataEase Remote Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46997 \nPublished : Sept. 23, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : DataEase is an open source data visualization analysis tool. Prior to version 2.10.1, an attacker can achieve remote command execution by adding a carefully constructed h2 data source connection string. The vulnerability has been fixed in v2.10.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T18:49:36.000000Z"}, {"uuid": "01300f49-72b1-4174-93a2-17185d83633b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46990", "type": "seen", "source": "https://t.me/cvedetector/6000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46990 - Directus Localhost Bypass via Loopback Devices\", \n  \"Content\": \"CVE ID : CVE-2024-46990 \nPublished : Sept. 18, 2024, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T20:05:48.000000Z"}, {"uuid": "2b60ac55-4f4b-4cd6-9d5c-f284aeeaefb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46992", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsv6s6hn7c2a", "content": "", "creation_timestamp": "2025-07-01T07:35:30.070542Z"}, {"uuid": "cb37986f-0c57-492a-8740-49d071790446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46990", "type": "published-proof-of-concept", "source": "https://t.me/jj_8tl/56", "content": "Short explanation of my CVE-2024-46990 \ud83d\udd25\nThe team of Directus mitigated SSRF by filtering out 127.0.0.1 and localhost. But using CIDR of 127.0.0.0/8 I was able to bypass it and get full SSRF!\nSee my SSRF payloads in the images below \ud83c\udfaf", "creation_timestamp": "2024-11-24T14:15:18.000000Z"}, {"uuid": "783a24de-8937-4ba9-a801-b1eebfbec645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46993", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsv3fkjsmp2r", "content": "", "creation_timestamp": "2025-07-01T06:34:45.366114Z"}, {"uuid": "9045fed4-7b87-4394-ae62-6a47b2d1c2b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46993", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-06T13:54:20.000000Z"}, {"uuid": "de1485ef-5cdf-4be2-8d94-09f272c54f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46992", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-06T13:54:20.000000Z"}, {"uuid": "f12dafe5-7d8e-43a8-8eb7-932d4f184cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46993", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-14T11:44:24.000000Z"}, {"uuid": "5c8bc218-e5ff-4ebf-be2e-478f04e0525f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46992", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-14T11:44:24.000000Z"}]}