{"vulnerability": "cve-2024-4824", "sightings": [{"uuid": "c92369ed-f0ba-453a-a22f-0cb970b116e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "https://t.me/thehackernews/6523", "content": "\ud83d\udc80 CISA just flagged this backup flaw as actively exploited!\n\nCVE-2024-48248 | Unauthenticated file read in NAKIVO Backup &amp; Replication exposes sensitive data &amp; credentials.\n\n\ud83d\udd39 Exploit already public\n\ud83d\udd39 Update before it\u2019s too late\n\nDetails: https://thehackernews.com/2025/03/cisa-adds-nakivo-vulnerability-to-kev.html", "creation_timestamp": "2025-03-20T11:47:57.000000Z"}, {"uuid": "19faef66-5eca-4841-a84f-58464f0e451c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-48248", "type": "seen", "source": "https://infosec.exchange/users/shadowserver/statuses/114078090873068276", "content": "", "creation_timestamp": "2025-02-27T21:58:48.110303Z"}, {"uuid": "b8aa645b-bca1-45d8-9c3a-99e6c11817aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lj6vlltn4k2q", "content": "", "creation_timestamp": "2025-02-27T22:05:31.210355Z"}, {"uuid": "19d4c50c-8ca6-4995-9cd1-4964c318b408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lj6vllto3s2q", "content": "", "creation_timestamp": "2025-02-27T22:05:32.164744Z"}, {"uuid": "98547200-9ac0-41a8-8b67-c5d95ff961a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkqs2imprg2v", "content": "", "creation_timestamp": "2025-03-19T18:15:19.126356Z"}, {"uuid": "825c540c-2655-4df3-8fff-2c1d7e0d58f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lkqtg6trvk2j", "content": "", "creation_timestamp": "2025-03-19T18:39:47.472195Z"}, {"uuid": "6d229095-022c-481c-9f1d-87cdf3fc503b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lkqtg6trvl2j", "content": "", "creation_timestamp": "2025-03-19T18:39:48.482047Z"}, {"uuid": "51322a57-9e65-459c-8cb5-c9dd0eefdac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lktltkmkkr2f", "content": "", "creation_timestamp": "2025-03-20T21:02:05.039463Z"}, {"uuid": "1488609b-72b9-4a70-8ef1-793fd0d8f96d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "f14b2874-87c9-44cf-8dd5-bcafe05cda53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "9a5de97a-33b7-46a7-b12d-3abdae0d337d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "6791241e-8a10-4184-85f9-d99435787c1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "e16c081f-1d66-490f-bad5-111d8b9457d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fad9ca3a-281b-45df-8311-03aee0a63af1", "content": "", "creation_timestamp": "2026-02-02T12:26:05.203885Z"}, {"uuid": "1ab543c1-988a-485b-ac22-b110ef130f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://t.me/cvedetector/19484", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48248 - NAKIVO Backup &amp; Replication Absolute Path Traversal Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-48248 \nPublished : March 4, 2025, 8:15 a.m. | 25\u00a0minutes ago \nDescription : NAKIVO Backup &amp; Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T09:59:00.000000Z"}, {"uuid": "7c6658a0-49f5-49e7-b1bf-b6ba5eee69c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "8d71fd2c-0093-453c-bed3-f9334d6b7b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48245", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/555", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48245\n\ud83d\udd39 Description: Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include \"Booking ID\", \"Action Name\", and \"Payment Confirmation ID\", which are present in /newvehicle.php and /newdriver.php.\n\ud83d\udccf Published: 2025-01-07T00:00:00\n\ud83d\udccf Modified: 2025-01-07T20:01:18.286Z\n\ud83d\udd17 References:\n1. http://vehicle.com\n2. https://github.com/ShadowByte1/CVE-2024-48245", "creation_timestamp": "2025-01-07T20:38:53.000000Z"}, {"uuid": "a76a908a-0770-4119-a861-094494da57bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "published-proof-of-concept", "source": "https://t.me/cIub1337/56", "content": "NAKIVO Backup &amp; Replication (CVE-2024-48248)\n\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/?123\n\nTelegram   \u2709\ufe0f @cIub1337\nX (Twitter) \ud83d\udd4a @club31337", "creation_timestamp": "2025-03-12T14:14:00.000000Z"}, {"uuid": "d9aea824-489d-40da-b2ef-01d0e315c9f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48246", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6671", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48246\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the \"Name\" parameter of /vehicle-management/booking.php.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T14:23:01.488Z\n\ud83d\udd17 References:\n1. https://github.com/ShadowByte1/CVE-2024-48246", "creation_timestamp": "2025-03-06T15:10:41.000000Z"}, {"uuid": "4c0537ac-bb19-42a3-a858-3ff35acbc86a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "https://t.me/claytechsolution/260", "content": "The Hacker News\nCISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup &amp; Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nThe vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to", "creation_timestamp": "2025-03-20T12:55:55.000000Z"}, {"uuid": "a68efbf1-33b6-48ff-92b5-c6a9d93b5fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://t.me/TopCyberTechNews/418", "content": "Top Security News for February 25, 2025\n\nThe Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup &amp; Replication (CVE-2024-48248)  \nhttps://www.reddit.com/r/netsec/comments/1iykzuc/the_best_security_is_when_we_all_agree_to_keep/\n\nMalicious PyPI Package \"automslc\" Enables 104K+ Unauthorized Deezer Music Downloads  \nhttps://thehackernews.com/2025/02/malicious-pypi-package-automslc-enables.html\n\nSOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent  \nhttps://thehackernews.com/2025/02/soc-30-evolution-of-soc-and-how-ai-is.html\n\nNew Linux Malware \u2018Auto-Color\u2019 Grants Hackers Full Remote Access to Compromised Systems  \nhttps://thehackernews.com/2025/02/new-linux-malware-auto-color-grants.html\n\nCERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries  \nhttps://thehackernews.com/2025/02/cert-ua-warns-of-uac-0173-attacks.html\n\nThree Password Cracking Techniques and How to Defend Against Them  \nhttps://thehackernews.com/2025/02/three-password-cracking-techniques-and.html\n\nKubernetes Golden Tickets  \nhttps://www.reddit.com/r/netsec/comments/1iyn5m4/kubernetes_golden_tickets/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-02-27T11:15:16.000000Z"}, {"uuid": "d24647b3-3a41-44b5-8319-c2ec58f70512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "Telegram/oVH4QcKwcnmJoBPiUXMGEzcucmh4YraLD8DrSdks5wzUlg", "content": "", "creation_timestamp": "2025-03-21T05:54:56.000000Z"}, {"uuid": "33e5cbe4-af61-483f-9538-5a0728e91e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48245", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62cf4svt25", "content": "", "creation_timestamp": "2025-01-07T16:16:20.290903Z"}, {"uuid": "f9d23d66-6b5f-4855-8384-f9874fd6f08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/iagox86.bsky.social/post/3llp45t3lss2w", "content": "", "creation_timestamp": "2025-03-31T19:36:01.176208Z"}, {"uuid": "8fcdf1b0-7f54-4408-a9f7-6b6a434d3910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "614664b3-a93d-4b04-bb4e-37a293aaf8e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lj46lnkerc2e", "content": "", "creation_timestamp": "2025-02-26T20:08:33.521395Z"}, {"uuid": "5a527a48-edd0-47d3-b1b2-9e0162f52bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lky2eu6i4c2x", "content": "", "creation_timestamp": "2025-03-22T15:32:54.232943Z"}, {"uuid": "f17576b0-1eee-4a12-9817-5ba71916a4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-19T21:10:04.000000Z"}, {"uuid": "db32244a-dca5-4f76-8711-9314875c8c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/areyou1or0.bsky.social/post/3lj4dnyjf7c2o", "content": "", "creation_timestamp": "2025-02-26T21:39:28.759366Z"}, {"uuid": "3e7f3fcd-da62-4282-b773-0fa0196eecbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lktso5qtyk2s", "content": "", "creation_timestamp": "2025-03-20T23:04:20.144989Z"}, {"uuid": "bcc38c9b-d5a4-4765-b4ca-92f3d0956456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lkvheqq3ll2w", "content": "", "creation_timestamp": "2025-03-21T14:47:30.646265Z"}, {"uuid": "779b2f97-0b10-4869-885f-ef6632356587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lktt6mfooz2p", "content": "", "creation_timestamp": "2025-03-20T23:13:29.757102Z"}, {"uuid": "93f0feac-dd5d-495a-807f-a19f187fdc36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3ll2i5xlk422e", "content": "", "creation_timestamp": "2025-03-23T14:44:58.011114Z"}, {"uuid": "2928fb06-196a-4736-ac09-d68ca54c0274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lktu3nnorc2s", "content": "", "creation_timestamp": "2025-03-20T23:29:48.702402Z"}, {"uuid": "3cf435af-ba82-4efe-878a-5bcffc6e7567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-25T08:06:32.000000Z"}, {"uuid": "4abaa014-1868-41c9-886d-68a3fcca957d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lku2m3rtns27", "content": "", "creation_timestamp": "2025-03-21T01:26:19.220764Z"}, {"uuid": "4b17dbd1-d215-459d-8ba6-138fe743c5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljkcp2o6so2t", "content": "", "creation_timestamp": "2025-03-04T10:59:19.300845Z"}, {"uuid": "b5f00cf3-1a57-4e64-a220-9ad93949e1df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/leekthehack.bsky.social/post/3ljarbcgees2d", "content": "", "creation_timestamp": "2025-02-28T15:53:28.295935Z"}, {"uuid": "f0602813-17fb-4a39-92c7-cbdd63519627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/leekthehack.bsky.social/post/3ljarg45aoc2d", "content": "", "creation_timestamp": "2025-02-28T15:56:08.665291Z"}, {"uuid": "4ffc3c58-2004-4f97-a049-160ea19f8645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114104001801278123", "content": "", "creation_timestamp": "2025-03-04T11:48:16.358792Z"}, {"uuid": "a9484850-7cdd-4462-9c39-aa8d7ebb1875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkyu7me63k2c", "content": "", "creation_timestamp": "2025-03-22T23:15:18.100769Z"}, {"uuid": "314b8571-513c-40e3-874d-8ca885d384ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkz43skltc2c", "content": "", "creation_timestamp": "2025-03-23T01:36:18.388627Z"}, {"uuid": "1c86e5e7-f55c-46cb-af89-a4fe045475f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://thehackernews.com/2025/03/cisa-adds-nakivo-vulnerability-to-kev.html", "content": "", "creation_timestamp": "2025-03-20T08:43:00.000000Z"}, {"uuid": "ea773282-6d5a-4c9a-bccf-844988f45c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3ll3iosxhby2z", "content": "", "creation_timestamp": "2025-03-24T00:27:01.962499Z"}, {"uuid": "8d364f5f-c4d3-4bf6-b582-d6b5ea2edea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkusxmv2ma2d", "content": "", "creation_timestamp": "2025-03-21T08:42:15.321340Z"}, {"uuid": "70ecb666-0ebb-4e57-8b24-27077c45ce57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkusxmyvcy2w", "content": "", "creation_timestamp": "2025-03-21T08:42:15.853703Z"}, {"uuid": "ee4c93e7-099b-4491-a070-b270e5e93847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-48248", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-fe1100ed-8b8f7f8e2b483b31", "content": "", "creation_timestamp": "2025-03-01T01:54:06.331648Z"}, {"uuid": "7af3a84c-bc94-41d2-917c-2275b35d5a14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48246", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljqfcqktqs2u", "content": "", "creation_timestamp": "2025-03-06T21:02:05.302757Z"}, {"uuid": "060a80d9-f05b-4935-9bba-7631f4d32cb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48246", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnrds4wdd2h", "content": "", "creation_timestamp": "2025-03-05T19:59:28.435230Z"}, {"uuid": "783697ae-405a-4ada-89d0-915086b75f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "8996e5f4-63e2-4c19-8756-ab6a74080a4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-48248.yaml", "content": "", "creation_timestamp": "2025-02-26T12:10:37.000000Z"}, {"uuid": "5743a612-dce0-4016-9132-71d5fa350781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "b24276bb-0031-4085-a8f2-fe394485501d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lj6vlj5s2c2q", "content": "", "creation_timestamp": "2025-02-27T22:05:30.279714Z"}, {"uuid": "9f5a65a9-a35f-4e30-8beb-33a67d2b2f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lj3b642uxs2u", "content": "", "creation_timestamp": "2025-02-26T11:22:04.328405Z"}, {"uuid": "9a24efb9-bc77-4948-8ffc-32b78e60bdf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lj3cycn4qw2j", "content": "", "creation_timestamp": "2025-02-26T11:54:32.882699Z"}, {"uuid": "9cc4a0ad-4441-44c2-b54a-e721df8c83f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-48248", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114263347092229183", "content": "", "creation_timestamp": "2025-04-01T15:11:51.240841Z"}, {"uuid": "3e28c9eb-6a00-497e-b373-04e7a682cfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-48248", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114263347092229183", "content": "", "creation_timestamp": "2025-04-01T15:11:51.246865Z"}, {"uuid": "e1fea664-4348-4688-a05c-a0b606e6f2f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "0ed8ed72-ebd5-4f0a-b5f5-402925d32da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "de6c2c1e-fb72-4c41-9a0e-52e7bb243b4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "8fe98493-bcc8-4183-9e83-058914d4b447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "ed390c42-f45e-4f60-b3fb-ef4367203fc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "d7770faa-f29f-4ec6-86e4-3d620d94d1b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "43ec84b7-db64-4725-a829-98333b96b0d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "07d8032e-45e1-462a-b5a1-c7c11623758a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "c94a71fb-da4e-4031-ad96-da5e11ac3d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "1caa8d0f-9182-441b-87a7-ef479a1c0b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "64744f51-4ef2-4087-add7-01f386f28ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "4766329a-082d-4ee3-883a-211e8f57dc71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48249", "type": "seen", "source": "https://t.me/cvedetector/7817", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48249 - Wavelog Gridmap_model PHP SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48249 \nPublished : Oct. 14, 2024, 3:15 p.m. | 45\u00a0minutes ago \nDescription : Wavelog 1.8.5 allows Gridmap_model.php get_band_confirmed SQL injection via band, sat, propagation, or mode. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T18:20:39.000000Z"}, {"uuid": "bc51db67-188d-4ca5-8d4f-c1b33eee62a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2594", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "b785bb72-64cb-4d6e-9e45-20b844a9fce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6989", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "c275c7bc-3f49-4e07-b5dc-57f0c8bfcb3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://t.me/true_secator/6794", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043d\u0438\u043c\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u0435\u043a\u0442\u043e\u0440\u044b \u0430\u0442\u0430\u043a.\n\n1. Chamilo LMS \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u00ab\u0441\u043b\u0435\u043f\u0443\u044e\u00bb \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SSRF, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0443\u044e Positive Technologies.\n\n2. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 Exim \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f SQLi, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2025-26794.\n\n3. VulnCheck \u0438\u0437\u0432\u043b\u0435\u043a\u043b\u0430 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u0441\u0435\u0445 CVE, \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0445 \u0432 \u043d\u0435\u0434\u0430\u0432\u043d\u0435\u0439 \u0443\u0442\u0435\u0447\u043a\u0435 \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u043a\u0438 \u0431\u0430\u043d\u0434\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 BlackBasta.\n\n\u041e\u043d \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u0430\u043a\u0438\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445, \u043a\u0430\u043a \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u044b, \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 Microsoft Windows. VulnCheck \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0430 \u0444\u043e\u043a\u0443\u0441\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 CVE \u0441 \u0443\u0436\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c\u0438.\n\n4. watchTowr Labs \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u041f\u041e \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Nakivo, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0438\u0437 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f.\n\n\u041e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-48248, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u043b\u0438 \u0441\u0430\u043c\u0438\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. watchTowr \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b \u043e\u0448\u0438\u0431\u043a\u0443, \u043d\u043e \u0442\u0430\u043a \u0438 \u043d\u0435 \u043e\u0442\u0432\u0435\u0442\u0438\u043b \u043d\u0430 \u0435\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435.\n\n5. Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0442\u0440\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432.\n\n6. \u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0434\u043b\u044f \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c Mattermost \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0442\u0440\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n7. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Modat \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435\u00a0\u0431\u043e\u043b\u0435\u0435 49\u00a0000 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (AMS) \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u0445 \u0438 \u0441\u0442\u0440\u0430\u043d\u0430\u0445, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u0441\u0435\u043a\u0442\u043e\u0440\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u0441\u0442\u0430\u043d\u0446\u0438\u0438\u00a0\u0438 \u0432\u043e\u0434\u043e\u043e\u0447\u0438\u0441\u0442\u043d\u044b\u0435 \u0441\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u044f.\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u0435 AMS \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u043b\u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043d\u0435\u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a \u043d\u0438\u043c \u0434\u043e\u0441\u0442\u0443\u043f.\n\n\u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0438\u043c\u0435\u043b\u0430\u0441\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u043e \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0430\u0445, \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0437\u0434\u0430\u043d\u0438\u0435.\n\n\u0418\u0437 \u043e\u0431\u0449\u0435\u0433\u043e \u0447\u0438\u0441\u043b\u0430 49 000 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 AMS \u0432 \u043c\u0438\u0440\u0435 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e (16 678) \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0418\u0442\u0430\u043b\u0438\u0438, \u041c\u0435\u043a\u0441\u0438\u043a\u0435 (5 940) \u0438 \u0412\u044c\u0435\u0442\u043d\u0430\u043c (5 035). \u0412 \u0421\u0428\u0410 Modat \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 1 966 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c AMS.", "creation_timestamp": "2025-02-28T17:30:05.000000Z"}, {"uuid": "6be7eade-3ff2-4009-bf30-d60147db8f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11868", "content": "#exploit\n1. CVE-2024-48248:\nNAKIVO Backup Replication Vulnerability\nhttps://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248\n\n2. CVE-2025-24016:\nWazuh Unsafe Deserialization RCE\nhttps://github.com/0xjessie21/CVE-2025-24016\n\n3. CVE-2025-1094:\nSQLI to RCE via WebSocket\nhttps://github.com/soltanali0/CVE-2025-1094-Exploit", "creation_timestamp": "2025-02-27T22:17:19.000000Z"}, {"uuid": "ffd9e087-5421-4a25-bc71-21112060286a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3lkv52gq7j22v", "content": "", "creation_timestamp": "2025-03-21T11:42:50.291278Z"}, {"uuid": "282a890b-2510-4a55-a8ae-0c6696876935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3610739", "content": "", "creation_timestamp": "2025-03-19T20:03:09.478012Z"}, {"uuid": "4fbae7b0-a881-4e91-b0f1-87949a3b85c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-48248", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkv5rpupkds2", "content": "", "creation_timestamp": "2025-03-21T11:56:03.716083Z"}, {"uuid": "b8ff866f-084d-4a20-b833-1587b21f4538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "6e0b5b27-f363-42e0-ade7-3abfad5629dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "5761d51e-7df0-4140-a907-7a54fca7343a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-23)", "content": "", "creation_timestamp": "2025-07-23T00:00:00.000000Z"}, {"uuid": "aa75dc0b-6100-4bca-83b7-ba7e5985f88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "a1f56132-bc4f-4658-bc51-9881c06ce473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-25)", "content": "", "creation_timestamp": "2025-07-25T00:00:00.000000Z"}, {"uuid": "d7a15143-d030-4cb7-96c2-638f7061fdbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-26)", "content": "", "creation_timestamp": "2025-07-26T00:00:00.000000Z"}, {"uuid": "28918d15-de99-4715-9d9c-3c63102ff46f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "6256bc26-008e-41a4-bccf-a357df6a1399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "ba915132-0b32-4a88-a1bb-9ca10fbff115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "cc42440a-7152-42b6-8405-db7a4b3599f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-05)", "content": "", "creation_timestamp": "2025-10-05T00:00:00.000000Z"}, {"uuid": "6d4e66ca-e0dd-472b-a787-2f13ccbfe3b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "73583bb3-081a-4f54-92e0-ac6d7dac541a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-19)", "content": "", "creation_timestamp": "2025-08-19T00:00:00.000000Z"}, {"uuid": "311f22a4-4e1b-4886-b363-5e5fa9041a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "a9254277-1c18-4e4a-9cb7-122062b6d6fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "4b727ca6-c51a-4340-ae60-65d7c1a79c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fad9ca3a-281b-45df-8311-03aee0a63af1", "content": "", "creation_timestamp": "2026-02-02T12:26:05.203885Z"}, {"uuid": "56e8a078-802f-4ee1-9dee-ed3a31d88fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48248", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6355", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48248\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: NAKIVO Backup &amp; Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).\n\ud83d\udccf Published: 2025-03-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-04T08:11:29.097Z\n\ud83d\udd17 References:\n1. https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/\n2. https://helpcenter.nakivo.com/Release-Notes/Content/Release-Notes.htm", "creation_timestamp": "2025-03-04T08:31:09.000000Z"}, {"uuid": "e189185b-a05b-4704-809f-a6cfd74860b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48246", "type": "seen", "source": "https://t.me/cvedetector/19658", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48246 - Volkswagen Vehicle Management System Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-48246 \nPublished : March 5, 2025, 7:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the \"Name\" parameter of /vehicle-management/booking.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T22:47:49.000000Z"}, {"uuid": "e5836904-5a2a-4d3b-858e-f08ae42d1ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48241", "type": "seen", "source": "https://t.me/cvedetector/9447", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48241 - Radare2 Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48241 \nPublished : Oct. 30, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : An issue in radare2 v5.8.0 through v5.9.4 allows a local attacker to cause a denial of service via the __bf_div function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T20:02:58.000000Z"}]}