{"vulnerability": "cve-2024-4806", "sightings": [{"uuid": "e12b6fbc-1d72-4081-9d17-03f1030d16b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8910", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPyTorch RemoteModule\u53cd\u5e8f\u5217\u5316\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2024-48063\uff09\u662f\u4e00\u4e2a\u5f71\u54cdPyTorch 2.4.1\u53ca\u66f4\u65e9\u7248\u672c\u7684\u4e25\u91cd\u5b89\u5168\u6f0f\u6d1e\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-48063-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-01T01:34:16.000000Z"}, {"uuid": "100b30f7-7f29-427c-81c0-e1f68fb8efbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48061", "type": "published-proof-of-concept", "source": "Telegram/RzZ013A6hXC-6kV-YI4QCReoYBbyiIzsP4toqc70fDWU4nE", "content": "", "creation_timestamp": "2025-07-04T03:00:05.000000Z"}, {"uuid": "28d4a227-c421-470b-8df3-729a656116dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48063", "type": "seen", "source": "https://t.me/cvedetector/9354", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48063 - PyTorch RemoteModule Deserialization Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-48063 \nPublished : Oct. 29, 2024, 9:15 p.m. | 42\u00a0minutes ago \nDescription : In PyTorch &lt;=2.4.1,\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T23:08:23.000000Z"}, {"uuid": "85f8594d-f170-4cbf-864a-d4d6a1821104", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48068", "type": "seen", "source": "https://t.me/cvedetector/11081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48068 - Landray EKP Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48068 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in Shenzhen Landray Software Co.,LTD Landray EKP v16 and earlier allows attackers to execute arbitrary web scripts or HTML via a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:40.000000Z"}, {"uuid": "059063fb-b2bb-4985-89b6-d7a103c406cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48061", "type": "seen", "source": "https://t.me/cvedetector/9798", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48061 - Langflow RCE\", \n  \"Content\": \"CVE ID : CVE-2024-48061 \nPublished : Nov. 4, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : langflow &lt;=1.0.18\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T01:19:10.000000Z"}, {"uuid": "f2ada70b-484e-42b9-800e-99fb94e4c1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48068", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487548730656521", "content": "", "creation_timestamp": "2024-11-15T14:56:07.999511Z"}]}