{"vulnerability": "cve-2024-4797", "sightings": [{"uuid": "8c69e02d-626f-408b-a597-0d406f1d70f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47978", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714061135749680", "content": "", "creation_timestamp": "2024-12-25T15:01:12.784265Z"}, {"uuid": "065384dd-bea5-4a6a-a7b3-4b89127f52be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47978", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5atmty4z2m", "content": "", "creation_timestamp": "2024-12-25T15:15:30.273502Z"}, {"uuid": "d6c9acb6-e4de-4b65-989e-5c06fbef841b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47978", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113715810481603401", "content": "", "creation_timestamp": "2024-12-25T22:26:05.681513Z"}, {"uuid": "2467aa51-cd00-4154-bf36-19f9f44a6610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47978", "type": "seen", "source": "https://t.me/cvedetector/13630", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47978 - Dell NativeEdge Execution with Unnecessary Privileges Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47978 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:29.000000Z"}, {"uuid": "84455bba-16cc-4d61-86d5-318eb4346167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47972", "type": "seen", "source": "https://t.me/cvedetector/7266", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47972 - Solidigm DC Arbitrary Resource Controller\", \n  \"Content\": \"CVE ID : CVE-2024-47972 \nPublished : Oct. 7, 2024, 8:15 p.m. | 24\u00a0minutes ago \nDescription : Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T22:39:19.000000Z"}, {"uuid": "3e6cba44-697d-4875-bf33-8c5f4e1f29ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47976", "type": "seen", "source": "https://t.me/cvedetector/7269", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47976 - Solidigm DC Products Firmware Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-47976 \nPublished : Oct. 7, 2024, 8:15 p.m. | 24\u00a0minutes ago \nDescription : Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T22:39:21.000000Z"}, {"uuid": "b9d6c9c9-c875-41ec-9d4b-7efb5c7aa788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47971", "type": "seen", "source": "https://t.me/cvedetector/7268", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47971 - SSD DC Products Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47971 \nPublished : Oct. 7, 2024, 8:15 p.m. | 24\u00a0minutes ago \nDescription : Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T22:39:20.000000Z"}, {"uuid": "fba9dbc7-79f9-4578-a477-327bb9aafde3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47975", "type": "seen", "source": "https://t.me/cvedetector/7262", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47975 - Solidigm DC Product Firmware Access Control Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47975 \nPublished : Oct. 7, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service. \nSeverity: 7.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T21:49:10.000000Z"}, {"uuid": "c645845f-5c27-4994-bcc6-6190df6e6f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47974", "type": "seen", "source": "https://t.me/cvedetector/7279", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47974 - Solidigm DC Products Resource Shutdown Denial of Service vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47974 \nPublished : Oct. 7, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T00:19:42.000000Z"}, {"uuid": "4bb4bcd2-186b-49a8-a8e0-43e7484e993e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47973", "type": "seen", "source": "https://t.me/cvedetector/7275", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47973 - Solidigm DC Products Path Redirecting Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47973 \nPublished : Oct. 7, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : In some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker. \nSeverity: 5.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T00:19:36.000000Z"}, {"uuid": "904b6b0c-b21d-48e7-8cd4-d8a22b46547d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47978", "type": "seen", "source": "Telegram/ITUPsZdF1X8zylX4CyRh293pjki8XmCmlxSJSTHAIB1VIHoQ", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}, {"uuid": "c53598ea-c266-4072-b5a6-a57301b7052d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47977", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1692/", "content": "", "creation_timestamp": "2024-12-16T05:00:00.000000Z"}, {"uuid": "343154f6-a02e-4367-b50d-18fae4b66767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47977", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1690/", "content": "", "creation_timestamp": "2024-12-16T05:00:00.000000Z"}, {"uuid": "65bc0864-69a6-4e61-9878-652df6d709c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47977", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1689/", "content": "", "creation_timestamp": "2024-12-16T05:00:00.000000Z"}, {"uuid": "0a40dcf1-7d5e-4858-a3b5-24bec2e299bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47977", "type": "seen", "source": "https://t.me/cvedetector/12494", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47977 - Dell Avamar SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47977 \nPublished : Dec. 10, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Dell Avamar, version(s) 19.9, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T13:17:28.000000Z"}, {"uuid": "16b28606-21ee-4690-b35d-2c67eba7ffdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47977", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113628075998358996", "content": "", "creation_timestamp": "2024-12-10T10:34:03.879017Z"}]}