{"vulnerability": "CVE-2024-26156", "sightings": [{"uuid": "2cc9390a-01fb-4cfa-9a6f-50e44ce35c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607903869018", "content": "", "creation_timestamp": "2025-01-17T16:20:58.461490Z"}, {"uuid": "ef032981-6ca7-4526-9961-65ffff051f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbx5ioq2f", "content": "", "creation_timestamp": "2025-01-17T17:15:48.940781Z"}, {"uuid": "9d86b51e-4a9d-4daa-a3a9-e0a06158bc7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxp3gf425", "content": "", "creation_timestamp": "2025-01-17T18:39:37.690480Z"}, {"uuid": "3e0a6711-2f76-4cf7-8721-d09795d8b19f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://t.me/cvedetector/15715", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26156 - \"ETIC Telecom RAS Reflected Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-26156 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nare vulnerable to reflected cross site scripting (XSS) attacks in the   \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets   \ntheir input from the client side and reflects the input in its response   \nto the client. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:06.000000Z"}, {"uuid": "5af42887-8886-4d3c-8a5c-125a6664bd31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2163", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26156\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client.\n\ud83d\udccf Published: 2025-01-17T16:12:26.288Z\n\ud83d\udccf Modified: 2025-01-17T16:12:26.288Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:03.000000Z"}]}