{"vulnerability": "CVE-2024-4484", "sightings": [{"uuid": "504d81f4-f24a-4596-8655-f4a82172b0eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "89b06621-8020-4146-bc89-026cbc121b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "9d53c615-85a7-4155-9a80-0c4a1987caba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44840", "type": "seen", "source": "https://gist.github.com/mstfsec/ee17035dddc16ea361009a6427843d97", "content": "", "creation_timestamp": "2025-05-19T19:44:27.000000Z"}, {"uuid": "ceda543e-b7e2-42a3-be54-b4bba947269e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "a9e49c32-f9b8-424c-a777-b598441c7733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "ed0f20a1-229e-4f02-8e9b-e74077ea912d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "9a009515-8d98-4c78-9d25-1a9278018ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "7de73c29-bd97-48d2-80d6-573c10ecc3a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18215", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44849\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.\n\ud83d\udccf Published: 2024-09-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-12T16:31:23.877Z\n\ud83d\udd17 References:\n1. https://github.com/extencil/CVE-2024-44849?tab=readme-ov-file\n2. https://blog.extencil.me/information-security/cves/cve-2024-44849\n3. https://www.qualitor.com.br/official-security-advisory-cve-2024-44849", "creation_timestamp": "2025-06-12T17:35:21.000000Z"}, {"uuid": "3c7d55f9-8e63-4b19-9105-859a4b0b5140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44843", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11900", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44843\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in the web socket handshake process of SteVe v3.7.1 allows attackers to bypass authentication and execute arbitrary coammands via supplying crafted OCPP requests.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T20:50:04.506Z\n\ud83d\udd17 References:\n1. https://github.com/steve-community/steve/issues/1546\n2. https://github.com/steve-community/steve/blob/master/src/main/java/de/rwth/idsg/steve/ocpp/ws/OcppWebSocketHandshakeHandler.java\n3. https://gist.github.com/Badranh/94359664799db6d4709871f0c353f476", "creation_timestamp": "2025-04-15T20:55:01.000000Z"}, {"uuid": "497db6a2-7669-448b-b11b-43dfbb2b7433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4484", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7630", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367\nURL\uff1ahttps://github.com/Abo5/CVE-2024-4484\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T23:13:42.000000Z"}, {"uuid": "90d7703e-9cc6-4e2e-893d-edef735f7f4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8471", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-44849 exploit\nURL\uff1ahttps://github.com/extencil/CVE-2024-44849\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-10T11:45:09.000000Z"}, {"uuid": "f934f94a-46f1-4b32-98d7-733effcf573f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "Telegram/nxkqUvF4ZNmyFcZwpwCcy2_-R_1nEcVV9TiB9D4Dn4tAnw", "content": "", "creation_timestamp": "2024-09-21T16:07:03.000000Z"}, {"uuid": "36bc17d7-c105-4ccb-b0eb-7506324885cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/415", "content": "", "creation_timestamp": "2024-09-21T20:25:51.000000Z"}, {"uuid": "8a3cea29-9cd7-4f22-b0bf-a7bed90924bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44845", "type": "seen", "source": "https://t.me/cvedetector/5005", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44845 - DrayTek Vigor3900 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44845 \nPublished : Sept. 6, 2024, 9:15 p.m. | 43\u00a0minutes ago \nDescription : DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the value parameter in the filter_string function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T00:07:51.000000Z"}, {"uuid": "52bf213c-75e2-45a4-a047-6afe7f43992a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44844", "type": "seen", "source": "https://t.me/cvedetector/5004", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44844 - DrayTek Vigor3900 Authenticated Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44844 \nPublished : Sept. 6, 2024, 9:15 p.m. | 43\u00a0minutes ago \nDescription : DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the name parameter in the run_command function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T00:07:50.000000Z"}, {"uuid": "a208864e-6fc3-4671-ad4b-3b286cbf591a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2040", "content": "", "creation_timestamp": "2024-09-21T16:06:49.000000Z"}, {"uuid": "82e7918b-eb0f-40e3-af30-e1554d0f65b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "seen", "source": "https://t.me/cvedetector/5117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44849 - Qualitor RCE via Arbitrary File Upload\", \n  \"Content\": \"CVE ID : CVE-2024-44849 \nPublished : Sept. 9, 2024, 6:15 p.m. | 23\u00a0minutes ago \nDescription : Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T20:39:58.000000Z"}, {"uuid": "85417d93-bf2a-44ac-b66f-12e213ed0d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18823", "content": "", "creation_timestamp": "2024-09-21T16:06:49.000000Z"}, {"uuid": "a00f4638-2e6e-4d2f-9409-967fc41eb827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44849", "type": "published-proof-of-concept", "source": "https://t.me/BackupLulz/245", "content": "", "creation_timestamp": "2024-11-03T04:41:27.000000Z"}]}