{"vulnerability": "CVE-2024-4883", "sightings": [{"uuid": "e7c5b08b-9ed8-4aab-a234-1c7348419002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48838", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113467922510004047", "content": "", "creation_timestamp": "2024-11-12T03:44:55.609236Z"}, {"uuid": "626970c9-b8c5-4df8-802d-745238657dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48839", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600310439215745", "content": "", "creation_timestamp": "2024-12-05T12:52:55.283258Z"}, {"uuid": "64efb022-74c3-4e3c-89ed-2bbe6a963e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48839", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "1bb66dcd-5c3d-4ab0-8240-b7eef535dfdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48831", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.901651Z"}, {"uuid": "1598bc26-b7a5-422f-8e9c-dcbb6d032071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48830", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.336470Z"}, {"uuid": "dddd2cf9-7df3-4414-aa3d-e9787c36e133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7892", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-48830\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.\n\ud83d\udccf Published: 2025-03-17T16:56:13.657Z\n\ud83d\udccf Modified: 2025-03-18T03:55:20.940Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-18T04:47:46.000000Z"}, {"uuid": "ba8673bc-b261-4e8e-8a44-cf93bf3066c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48831", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkltwzdqin26", "content": "", "creation_timestamp": "2025-03-17T19:05:51.925788Z"}, {"uuid": "ee5ea51c-7b8d-461a-863c-f996663680c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48831", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114179499655627410", "content": "", "creation_timestamp": "2025-03-17T19:48:21.120911Z"}, {"uuid": "ebe4f51f-b75d-4f00-a68c-cd1dea6db2df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48839", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigyvasz2t", "content": "", "creation_timestamp": "2025-04-16T21:02:25.661264Z"}, {"uuid": "3d7b5110-bd80-4cbe-8c52-da95c677b557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4883", "type": "published-proof-of-concept", "source": "Telegram/FUryBaeTd16I_Z_BI23kcNzYjlRgHXorESHpEaaZvMk8bEI", "content": "", "creation_timestamp": "2024-07-11T04:35:45.000000Z"}, {"uuid": "fd4d062a-d2da-45d5-a557-b157a2ab5f16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48831", "type": "seen", "source": "https://t.me/cvedetector/20519", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48831 - Dell SmartFabric OS10 Hard-Coded Password Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-48831 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.6.x, contain(s) a Use of Hard-coded Password vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:50.000000Z"}, {"uuid": "32193536-807a-4c4f-8c67-d65dd99f9430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48830", "type": "seen", "source": "https://t.me/cvedetector/20495", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48830 - Dell SmartFabric OS10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48830 \nPublished : March 17, 2025, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T19:08:47.000000Z"}, {"uuid": "59d82f10-dc50-4e63-8032-28011cf1dcc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48839", "type": "seen", "source": "https://t.me/cvedetector/12096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48839 - Improper Input Validation vulnerability allows Rem\", \n  \"Content\": \"CVE ID : CVE-2024-48839 \nPublished : Dec. 5, 2024, 1:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Input Validation vulnerability allows Remote Code Execution.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:35.000000Z"}, {"uuid": "24939a38-dc3b-4e04-8237-ecd52cc23c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48837", "type": "seen", "source": "https://t.me/cvedetector/10578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48837 - Dell SmartFabric OS10 Execution with Unnecessary Privileges Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48837 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:40.000000Z"}, {"uuid": "30e44edf-6992-48eb-95bc-0c87f1703657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4883", "type": "published-proof-of-concept", "source": "Telegram/E0K4SacbBo7vvN_grN7HUJjKIuPNHN1egbc3qXVTBTE2Hg", "content": "", "creation_timestamp": "2024-07-11T07:55:58.000000Z"}, {"uuid": "8aa4fb40-b320-4f98-9bcb-0c3b094594d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4883", "type": "published-proof-of-concept", "source": "Telegram/yyHU4AmcuvzMH7Mr_Iyg6WOXfkLoQk9lbnAqVqjqphJYHjY", "content": "", "creation_timestamp": "2024-08-09T09:36:15.000000Z"}]}