{"vulnerability": "CVE-2024-4691", "sightings": [{"uuid": "5eed0000-4037-4019-a1b4-ea83c2b49ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46919", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpzautmnl2h", "content": "", "creation_timestamp": "2025-01-14T19:45:31.191831Z"}, {"uuid": "842e8cf7-b6a2-4bfe-a819-2840e635aff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-46919", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822087634757079", "content": "", "creation_timestamp": "2025-01-13T16:53:46.300823Z"}, {"uuid": "cdac4c34-5d8e-4770-8c78-92daa0f7820a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46919", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113822249973117109", "content": "", "creation_timestamp": "2025-01-13T17:35:03.404393Z"}, {"uuid": "a776b7a3-ce10-48dc-baa8-48ec6d30d0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3li5ch2jzj52x", "content": "", "creation_timestamp": "2025-02-14T13:25:02.466985Z"}, {"uuid": "f0bf04f0-691b-494a-97c9-2e54482baef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhywmytljf2f", "content": "", "creation_timestamp": "2025-02-12T19:42:57.575850Z"}, {"uuid": "588d1d1c-de0a-447b-bd1e-31d8a590dc8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113995756330783663", "content": "", "creation_timestamp": "2025-02-13T09:00:00.317413Z"}, {"uuid": "80442ad2-35c8-40d9-ba15-79a9fbacc9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2e2gcbdx2a", "content": "", "creation_timestamp": "2025-02-13T09:15:46.374467Z"}, {"uuid": "a0a2de81-4720-4f07-a2d6-9d56f070c7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li2i7y6l6q2z", "content": "", "creation_timestamp": "2025-02-13T10:30:31.257473Z"}, {"uuid": "ab73ac80-d558-464a-9a88-6f018a6dedf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4220", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46910\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An authenticated user can perform XSS and potentially impersonate another user.\n\nThis issue affects Apache Atlas versions\u00a02.3.0 and earlier.\n\nUsers are recommended to upgrade to version 2.4.0, which fixes the issue.\n\ud83d\udccf Published: 2025-02-13T09:31:26Z\n\ud83d\udccf Modified: 2025-02-13T09:31:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-46910\n2. https://lists.apache.org/thread/sqzp34l4cdk21zoq5g31qlsvr7jvb1fy\n3. http://www.openwall.com/lists/oss-security/2025/02/12/2", "creation_timestamp": "2025-02-13T10:08:55.000000Z"}, {"uuid": "a7dece3d-75d1-4bac-9ddb-97fe856803b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46919", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1376", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46919\n\ud83d\udd39 Description: An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadOutputBuffers.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T19:41:00.570Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-46919/", "creation_timestamp": "2025-01-13T20:07:29.000000Z"}, {"uuid": "2dd6ed7b-2c63-4aaa-9649-ed944651f50b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46911", "type": "seen", "source": "https://t.me/cvedetector/7804", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46911 - Apache Roller CSRF Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-46911 \nPublished : Oct. 14, 2024, 9:15 a.m. | 15\u00a0minutes ago \nDescription : Cross-site Resource Forgery (CSRF), Privilege escalation vulnerability in Apache Roller. On multi-blog/user Roller websites, by default weblog owners are trusted to publish arbitrary weblog content and this combined with a deficiency in Roller's CSRF protections allowed an escalation of privileges attack. This issue affects Apache Roller before 6.1.4.  \n  \nRoller users who run multi-blog/user Roller websites are recommended to upgrade to version 6.1.4, which fixes the issue.  \n  \nRoller 6.1.4 release announcement:\u00a0  \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T11:39:02.000000Z"}, {"uuid": "5bb251e1-c612-43d0-b770-4f1d773499f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46918", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46918\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org.\n\ud83d\udccf Published: 2024-09-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T14:35:06.415Z\n\ud83d\udd17 References:\n1. https://github.com/MISP/MISP/commit/3a5227d7b3d4518ac109af61979a00145a0de6fa\n2. https://github.com/MISP/MISP/compare/v2.4.197...v2.4.198", "creation_timestamp": "2025-03-13T14:45:31.000000Z"}, {"uuid": "56312578-72d4-452b-9664-8b0fd09dcc27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "https://t.me/cvedetector/17991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46910 - Apache Atlas Cross-Site Scripting (XSS) and Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-46910 \nPublished : Feb. 13, 2025, 9:15 a.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : An authenticated user can perform XSS and potentially impersonate another user.  \n  \nThis issue affects Apache Atlas versions\u00a02.3.0 and earlier.  \n  \nUsers are recommended to upgrade to version 2.4.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T12:58:57.000000Z"}, {"uuid": "c3de4089-f58e-4886-9aab-f71b2885c12e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46919", "type": "seen", "source": "https://t.me/cvedetector/15162", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46919 - Samsung Mobile Processor Exynos Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-46919 \nPublished : Jan. 13, 2025, 5:15 p.m. | 20\u00a0minutes ago \nDescription : An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadOutputBuffers. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T18:45:06.000000Z"}, {"uuid": "b275e59d-c0ec-445f-bd7a-f7f8133022c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46918", "type": "seen", "source": "https://t.me/cvedetector/5697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46918 - MISP Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46918 \nPublished : Sept. 15, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-15T22:38:11.000000Z"}, {"uuid": "35389843-e1ac-43d0-b100-390e95f7c8ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "Telegram/7ecHkQQ4WylH0zXdrwP9apXDx0lGqJG_Y3KFaR_YyjZgghsl", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}, {"uuid": "9edcb100-8da0-4ddd-b25e-b2e7b987fd01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46910", "type": "seen", "source": "Telegram/TGCu3oKCdenAtJp7fTVqGFIYcVnoeAtPRVSfpkIwFErD8ciZ", "content": "", "creation_timestamp": "2025-02-14T10:06:09.000000Z"}]}