{"vulnerability": "CVE-2024-4739", "sightings": [{"uuid": "773eb516-61d8-45df-bd28-e0b62d148da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113786024577853273", "content": "", "creation_timestamp": "2025-01-07T08:02:28.007940Z"}, {"uuid": "30c0c3e5-945f-4bf2-80f6-e833a11f8c00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf57hlrnae22", "content": "", "creation_timestamp": "2025-01-07T08:16:03.835371Z"}, {"uuid": "c77362a3-e073-4c49-85e1-18f76b9c3401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113786206198889937", "content": "", "creation_timestamp": "2025-01-07T08:48:39.185764Z"}, {"uuid": "6e5cedec-19d6-4507-91ff-d185126da221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/381", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47398\n\ud83d\udd39 Description: in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.\n\ud83d\udccf Published: 2025-01-07T07:57:02.974Z\n\ud83d\udccf Modified: 2025-01-07T07:57:02.974Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md", "creation_timestamp": "2025-01-07T08:39:03.000000Z"}, {"uuid": "79287eae-b8e4-4d0d-8db7-92f71ee24414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47397", "type": "seen", "source": "https://t.me/cvedetector/13174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47397 - AE1021/AE1021PE Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47397 \nPublished : Dec. 18, 2024, 7:15 a.m. | 24\u00a0minutes ago \nDescription : Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T08:40:37.000000Z"}, {"uuid": "69576c51-c9fd-4d13-b841-7b7697fc5824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://t.me/cvedetector/14496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47398 - OpenHarmony Boot Problematic OUT-of-Bounds Write\", \n  \"Content\": \"CVE ID : CVE-2024-47398 \nPublished : Jan. 7, 2025, 8:15 a.m. | 20\u00a0minutes ago \nDescription : in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T09:41:17.000000Z"}, {"uuid": "043409f7-d33f-4142-831b-03cea2f27f54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4739", "type": "seen", "source": "https://t.me/cvedetector/8306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4739 - MXsecurity Authenticated Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4739 \nPublished : Oct. 18, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T11:54:05.000000Z"}, {"uuid": "3f28f9f0-d508-4809-b8fb-3e8b2044874e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47396", "type": "seen", "source": "https://t.me/cvedetector/6696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47396 - Move Addons for Elementor Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-47396 \nPublished : Oct. 1, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T05:12:33.000000Z"}, {"uuid": "f37f0bfc-287f-4fed-a3b9-2504c3a75c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47391", "type": "seen", "source": "https://t.me/cvedetector/7088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47391 - BoldThemes Bold Page Builder Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-47391 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a before 5.1.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:10.000000Z"}, {"uuid": "24a10b0b-b115-4567-bc6d-119580321df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47395", "type": "seen", "source": "https://t.me/cvedetector/7092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47395 - Robokassa Woocommerce Reflected XSS\", \n  \"Content\": \"CVE ID : CVE-2024-47395 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Robokassa Robokassa payment gateway for Woocommerce allows Reflected XSS.This issue affects Robokassa payment gateway for Woocommerce: from n/a through 1.6.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:13.000000Z"}, {"uuid": "0f3aca91-2a56-4a67-aeeb-d4678ba8a6ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47393", "type": "seen", "source": "https://t.me/cvedetector/7090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47393 - Quill Forms Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-47393 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Quillforms Quill Forms allows Stored XSS.This issue affects Quill Forms: from n/a through 3.7.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:11.000000Z"}, {"uuid": "4db97b54-cc5c-4bb9-b47d-936de62f1fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47392", "type": "seen", "source": "https://t.me/cvedetector/7089", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47392 - BdThemes Element Pack Elementor Addons Stored Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47392 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.7.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:11.000000Z"}, {"uuid": "1f390bbd-a206-43fa-a8ba-453be569b0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47390", "type": "seen", "source": "https://t.me/cvedetector/7087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47390 - Jegtheme Jeg Elementor Kit Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47390 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jegtheme Jeg Elementor Kit allows Stored XSS.This issue affects Jeg Elementor Kit: from n/a through 2.6.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:06.000000Z"}, {"uuid": "ac98aab7-c04c-49d7-9f10-8561c690f1ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47394", "type": "seen", "source": "https://t.me/cvedetector/7091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47394 - Eyecix JobSearch Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-47394 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in eyecix JobSearch allows Reflected XSS.This issue affects JobSearch: from n/a through 2.5.9. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:12.000000Z"}]}