{"vulnerability": "CVE-2024-4854", "sightings": [{"uuid": "aad2bda9-8397-44e7-a066-be8d1819960d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48547", "type": "seen", "source": "https://t.me/cvedetector/8811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48547 - DreamCatcher Life Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48547 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of DreamCatcher Life v1.8.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:52.000000Z"}, {"uuid": "c5eafdc4-9e95-4b89-91df-a2d516392cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48546", "type": "seen", "source": "https://t.me/cvedetector/8810", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48546 - Wear Sync Insecure APK Access Control\", \n  \"Content\": \"CVE ID : CVE-2024-48546 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of Wear Sync v1.2.0 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:51.000000Z"}, {"uuid": "c1baa4ec-d319-4157-8a9b-664c8157f37d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48545", "type": "seen", "source": "https://t.me/cvedetector/8809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48545 - Ivy Smart Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48545 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of IVY Smart v4.5.0 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:48.000000Z"}, {"uuid": "46d90ac4-c61d-45ea-a1a9-97353c0bba7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48542", "type": "seen", "source": "https://t.me/cvedetector/8808", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48542 - Yamaha Headphones Controller Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48542 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of Yamaha Headphones Controller v1.6.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:47.000000Z"}, {"uuid": "62846f84-7452-4e06-a119-46d067cd474d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48544", "type": "seen", "source": "https://t.me/cvedetector/8807", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48544 - Sylvania Smart Home Insecure Code Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48544 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:46.000000Z"}, {"uuid": "2134b257-1607-44d1-a78f-01996828691c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48548", "type": "seen", "source": "https://t.me/cvedetector/8806", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48548 - Cloud Smart Lock Cross-Site Request Forgery (CSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-48548 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:45.000000Z"}, {"uuid": "5ab816ea-7e66-4dad-84fe-c88b98ae6b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48540", "type": "seen", "source": "https://t.me/cvedetector/8817", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48540 - XIAO HE Smart APK Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48540 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in XIAO HE Smart 4.3.1 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:10:01.000000Z"}, {"uuid": "3e487fab-1a7b-4fab-b411-623e15cbfaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48541", "type": "seen", "source": "https://t.me/cvedetector/8805", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48541 - Ruochan Smart Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48541 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Incorrect access control in the firmware update and download processes of Ruochan Smart v4.4.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:09:44.000000Z"}]}