{"vulnerability": "CVE-2024-3448", "sightings": [{"uuid": "3e70169a-571a-41c7-b5e6-6ee3f6c8a4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3448", "type": "seen", "source": "https://t.me/arpsyndicate/4524", "content": "#ExploitObserverAlert\n\nCVE-2024-3448\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3448. Users with low privileges can perform certain AJAX actions.  In this vulnerability instance, improper access to ajax?action=plugin:focus:checkIframeAvailability leads to a Server-Side Request Forgery by analyzing the error messages returned from the back-end. Allowing an attacker to perform a port scan in the back-end. At the time of publication of the CVE no patch is available.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T05:17:27.000000Z"}, {"uuid": "b098a8d4-4665-4f05-b735-f6b7b324ad8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34481", "type": "seen", "source": "https://t.me/cvedetector/77", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34481 - drupal-wiki.com Drupal Wiki before 8.31.1 allows X\", \n  \"Content\": \"CVE ID : CVE-2024-34481 \nPublished : July 5, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : drupal-wiki.com Drupal Wiki before 8.31.1 allows XSS via comments, captions, and image titles of a Wiki page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T04:58:25.000000Z"}]}