{"vulnerability": "cve-2024-4893", "sightings": [{"uuid": "746e87aa-aca0-4092-8a09-0bd19fd5f93a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11352", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-26926:\nLinux kernel bug in Binder component\nhttps://github.com/MaherAzzouzi/LinuxKernel-nday/tree/main/CVE-2024-26926\n\n3. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-30T17:37:26.000000Z"}, {"uuid": "0b654aa7-e1f2-4d12-9a9b-563818a2b23a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48936", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:31.000000Z"}, {"uuid": "8b2ce897-9779-4d99-9dfa-d0313219c296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}, {"uuid": "1d696361-9c75-4c1e-b2b4-d6206ac79216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/668", "content": "https://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm\n\nPrivate key extraction over ECDH cve-2024-48930\n#github #exploit", "creation_timestamp": "2024-10-30T11:03:37.000000Z"}, {"uuid": "7ec1ce2d-7d73-4b1b-b9a2-2a7d7b7209ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48936", "type": "seen", "source": "https://t.me/cvedetector/9090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48936 - Slurm Incorrect Authorization Vulntnr\", \n  \"Content\": \"CVE ID : CVE-2024-48936 \nPublished : Oct. 28, 2024, 4:15 a.m. | 41\u00a0minutes ago \nDescription : SchedMD Slurm before 24.05.4 has Incorrect Authorization. A mistake in authentication handling in stepmgr could permit an attacker to execute processes under other users' jobs. This is limited to jobs explicitly running with --stepmgr, or on systems that have globally enabled stepmgr via SlurmctldParameters=enable_stepmgr in their configuration. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T06:07:24.000000Z"}, {"uuid": "9ca9fb39-965b-408a-95a1-d4f0d924006b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48939", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113461529914411224", "content": "", "creation_timestamp": "2024-11-11T00:39:12.118157Z"}, {"uuid": "70fb6973-807a-4c9f-9403-c6d7339900f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48936", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}, {"uuid": "3c4472f4-4d84-40d3-ab08-6ce980b96494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/646", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-29T10:48:04.000000Z"}, {"uuid": "0f39cc11-f976-4bbe-a7aa-686b9f51ee21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48939", "type": "seen", "source": "https://t.me/cvedetector/10450", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48939 - Paxton Net2 Unvalidated License File Processing Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48939 \nPublished : Nov. 11, 2024, 1:15 a.m. | 17\u00a0minutes ago \nDescription : Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T02:43:04.000000Z"}, {"uuid": "39aa1700-f5ee-473b-821a-142855cd4730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48932", "type": "seen", "source": "https://t.me/cvedetector/8849", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48932 - ZimaOS CasaOS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48932 \nPublished : Oct. 24, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http:///v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T00:21:24.000000Z"}, {"uuid": "906ebdc9-d787-4121-91f0-e91c976cb737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48938", "type": "seen", "source": "https://t.me/cvedetector/7750", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48938 - Znuny Email HTML Parsing Denial of Service/Regular Expression Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-48938 \nPublished : Oct. 11, 2024, 9:15 p.m. | 23\u00a0minutes ago \nDescription : Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T23:45:12.000000Z"}, {"uuid": "28a16cb3-3d1e-49df-ae6c-770966bfc9bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48937", "type": "seen", "source": "https://t.me/cvedetector/7749", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48937 - Znuny XSS Vulnerability in Activity Dialogues\", \n  \"Content\": \"CVE ID : CVE-2024-48937 \nPublished : Oct. 11, 2024, 9:15 p.m. | 23\u00a0minutes ago \nDescription : Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. JavaScript code in the short description of the SLA field in Activity Dialogues is executed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T23:45:10.000000Z"}, {"uuid": "b4450f0c-033c-47cb-a449-f988eac0b5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4904", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-30T07:05:32.000000Z"}, {"uuid": "afcc8973-4b28-4cab-afac-a0cc427b9305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48930", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:30.000000Z"}, {"uuid": "5197e0c3-5470-4727-a542-1b372230a343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48938", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7571", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48938\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process.\n\ud83d\udccf Published: 2024-10-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T13:44:45.162Z\n\ud83d\udd17 References:\n1. https://www.znuny.com\n2. https://www.znuny.org/en/advisories\n3. https://www.znuny.org/en/advisories/zsa-2024-04", "creation_timestamp": "2025-03-14T14:45:32.000000Z"}, {"uuid": "1f6e0d60-26e7-4eba-8cd5-e6ea733dee49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48931", "type": "seen", "source": "https://t.me/cvedetector/8855", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48931 - ZimaOS UEFI File Path traversal Remote File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48931 \nPublished : Oct. 24, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http:///v3/file?token=&amp;files=` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T00:21:32.000000Z"}, {"uuid": "ec9f426e-75e1-47cf-a2eb-56e3557d14fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48933", "type": "seen", "source": "https://t.me/cvedetector/7537", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48933 - LemonLDAP::NG Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-48933 \nPublished : Oct. 9, 2024, 11:15 p.m. | 25\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.19.3 allows remote attackers to inject arbitrary web script or HTML into the login page via a username if userControl has been set to a non-default value that allows special HTML characters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T01:41:42.000000Z"}]}