{"vulnerability": "CVE-2024-4247", "sightings": [{"uuid": "d5198a1d-e54e-4636-83e0-7306c51742c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42472", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m5y57mpsec2o", "content": "", "creation_timestamp": "2025-11-19T11:22:24.465880Z"}, {"uuid": "87fd80b1-bca6-4ca5-87ef-f9a4106fa86e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo57i2ki3z2p", "content": "", "creation_timestamp": "2025-05-01T21:03:07.538287Z"}, {"uuid": "a2237dc6-8571-46ec-bc9a-7253715f655a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42472", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llukqgutp22j", "content": "", "creation_timestamp": "2025-04-02T23:40:15.505730Z"}, {"uuid": "7e89d74f-b4f0-47f9-b354-c77b360e0835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lnznwmre3m2o", "content": "", "creation_timestamp": "2025-04-30T11:11:08.467725Z"}, {"uuid": "05eb7d2a-bf62-4b19-940b-98539a763d2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://t.me/cvedetector/4654", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42471 - GitHub Actions Artifact Path Traversal Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42471 \nPublished : Sept. 2, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : actions/artifact is the GitHub ToolKit for developing GitHub Actions.  Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T21:24:29.000000Z"}, {"uuid": "3fb39bda-83e2-4ebb-b500-a4da37f7a708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42472", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10037", "content": "\u200aCritical Vulnerability Found in Flatpak: CVE-2024-42472 (CVSS 10) Exposes Files Outside Sandbox\n\nhttps://securityonline.info/critical-vulnerability-found-in-flatpak-cve-2024-42472-cvss-10-exposes-files-outside-sandbox/", "creation_timestamp": "2024-08-16T10:20:56.000000Z"}, {"uuid": "f8f86f6f-8481-4806-befe-df3daf89228d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2571", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42471\n\ud83d\udd39 Description: actions/artifact is the GitHub ToolKit for developing GitHub Actions.  Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.\n\ud83d\udccf Published: 2024-09-02T16:13:50.712Z\n\ud83d\udccf Modified: 2025-01-22T15:12:27.332Z\n\ud83d\udd17 References:\n1. https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3\n2. https://github.com/actions/toolkit/pull/1724\n3. https://snyk.io/research/zip-slip-vulnerability", "creation_timestamp": "2025-01-22T16:02:00.000000Z"}, {"uuid": "9f15df83-a5eb-4e30-a8ef-33f061a50a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42472", "type": "seen", "source": "https://t.me/cvedetector/3277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42472 - Flatpak Data Levy and Integrityasto Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42472 \nPublished : Aug. 15, 2024, 7:15 p.m. | 25\u00a0minutes ago \nDescription : Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality.  \n  \nWhen `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access.  \n  \nHowever, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox.  \n  \nPartial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code.  \n  \nFor the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson \"wrap\" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-15T21:49:35.000000Z"}, {"uuid": "2fe5f8e5-b35e-43d1-9625-088254785408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42476", "type": "seen", "source": "https://t.me/cvedetector/3274", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42476 - Nim OAuth Library CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42476 \nPublished : Aug. 15, 2024, 7:15 p.m. | 25\u00a0minutes ago \nDescription : In the OAuth library for nim prior to version 0.11, the Authorization Code grant and Implicit grant both rely on the `state` parameter to prevent cross-site request forgery (CSRF) attacks where a resource owner might have their session associated with protected resources belonging to an attacker. When this project is compiled with certain compiler flags set, it is possible that the `state` parameter will not be checked at all, creating a CSRF vulnerability. Version 0.11 checks the `state` parameter using a regular `if` statement or `doAssert` instead of relying on a plain `assert`. `doAssert` will achieve the desired behavior even if `-d:danger` or `--assertions:off` is set. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-15T21:49:32.000000Z"}, {"uuid": "90213dfa-b732-42fc-9c1c-c2f2cc0ba687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42475", "type": "seen", "source": "https://t.me/cvedetector/3276", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42475 - Nim OAuth Library: Predictable State Generation CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42475 \nPublished : Aug. 15, 2024, 7:15 p.m. | 25\u00a0minutes ago \nDescription : In the OAuth library for nim prior to version 0.11, the `state` values generated by the `generateState` function do not have sufficient entropy. These can be successfully guessed by an attacker allowing them to perform a CSRF vs a user, associating the user's session with the attacker's protected resources. While `state` isn't exactly a cryptographic value, it should be generated in a cryptographically secure way. `generateState` should be using a CSPRNG. Version 0.11 modifies the `generateState` function to generate `state` values of at least 128 bits of entropy while using a CSPRNG. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-15T21:49:34.000000Z"}, {"uuid": "5458f222-a122-41bf-a237-2b8104640216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42474", "type": "seen", "source": "https://t.me/cvedetector/2878", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42474 - Snowflake Streamlit Windows Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42474 \nPublished : Aug. 12, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Streamlit is a data oriented application development framework for python. Snowflake Streamlit open source addressed a security vulnerability via the static file sharing feature. Users of hosted Streamlit app(s) on Windows were vulnerable to a path traversal vulnerability when the static file sharing feature is enabled. An attacker could utilize the vulnerability to leak the password hash of the Windows user running Streamlit. The vulnerability was patched on Jul 25, 2024, as part of Streamlit open source version 1.37.0. The vulnerability only affects Windows. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T20:10:38.000000Z"}, {"uuid": "57367d86-0739-46b2-8e04-35901b2e675f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42477", "type": "seen", "source": "https://t.me/cvedetector/2845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42477 - llama.cpp RPC Tensor Global Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-42477 \nPublished : Aug. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : llama.cpp provides LLM inference in C/C++. The unsafe `type` member in the `rpc_tensor` structure can cause `global-buffer-overflow`. This vulnerability may lead to memory data leakage. The vulnerability is fixed in b3561. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T18:27:13.000000Z"}, {"uuid": "462d7796-feb3-44c6-805d-f5b97c11c22d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42479", "type": "seen", "source": "https://t.me/cvedetector/2844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42479 - LLaMA.cpp RPC Tensor Address Writing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42479 \nPublished : Aug. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address writing. This vulnerability is fixed in b3561. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T18:27:12.000000Z"}, {"uuid": "f4bffd8c-578f-4c8b-81bd-1fdf129d7850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42478", "type": "seen", "source": "https://t.me/cvedetector/2842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42478 - \"LLama C/C++ Unauthenticated Arbitrary Read\"\", \n  \"Content\": \"CVE ID : CVE-2024-42478 \nPublished : Aug. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : llama.cpp provides LLM inference in C/C++. The unsafe `data` pointer member in the `rpc_tensor` structure can cause arbitrary address reading. This vulnerability is fixed in b3561. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T18:27:10.000000Z"}, {"uuid": "005cd7b1-265d-4e32-b0a9-0ec7d8b5c004", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42479", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/9981", "content": "\u200aCVE-2024-42479 (CVSS 10) in Popular Python Package llama_cpp_python Exposes Millions to RCE\n\nhttps://securityonline.info/cve-2024-42479-cvss-10-in-popular-python-package-llama_cpp_python-exposes-millions-to-rce/", "creation_timestamp": "2024-08-15T16:00:56.000000Z"}, {"uuid": "0fb6626a-2ce2-4b66-b5fb-bea4bc4b8578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "published-proof-of-concept", "source": "Telegram/hru7NN7EYI-xT4JmOnsEkxtF0d6B0YZMLzams5CbWl1Ym4s", "content": "", "creation_timestamp": "2025-04-24T23:00:06.000000Z"}]}