{"vulnerability": "CVE-2024-4011", "sightings": [{"uuid": "a4cfef9c-d4c6-4146-beba-1aeca14e5c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40113", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqn5eyrjl3s2", "content": "", "creation_timestamp": "2025-06-02T16:00:05.154620Z"}, {"uuid": "35f427b4-4fef-47a6-83e3-c51a4c90f594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40112", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqn5eyhnfoc2", "content": "", "creation_timestamp": "2025-06-02T16:00:05.732040Z"}, {"uuid": "f1ad5587-5214-41e3-b9e0-565628e29dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40114", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqn5f6kkv7y2", "content": "", "creation_timestamp": "2025-06-02T16:00:08.031740Z"}, {"uuid": "d7bfbb23-a900-4a1b-89ed-32c9fdf48adc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40119", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8001", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1ageoserver CVE-2024-36401\u6f0f\u6d1e\u5229\u7528\u5de5\u5177\nURL\uff1ahttps://github.com/sudo-subho/nepstech-xpon-router-CVE-2024-40119\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-17T03:07:05.000000Z"}, {"uuid": "45ec33d7-cd84-4194-bee2-4ba50459670e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40111", "type": "seen", "source": "https://t.me/cvedetector/4043", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40111 - Automad XSS Stored Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40111 \nPublished : Aug. 23, 2024, 9:15 p.m. | 25\u00a0minutes ago \nDescription : A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker to inject malicious JavaScript code into the template body. The injected code is stored within the flat file CMS and is executed in the browser of any user visiting the forum. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T23:49:30.000000Z"}, {"uuid": "b448d28f-00d4-4c82-978f-183ded041614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4011", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4011\n\ud83d\udd39 Description: An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives.\n\ud83d\udccf Published: 2024-06-26T23:31:20.436Z\n\ud83d\udccf Modified: 2025-01-09T21:38:32.388Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/457235\n2. https://hackerone.com/reports/2456186", "creation_timestamp": "2025-01-09T22:15:58.000000Z"}, {"uuid": "e04a6472-d8d3-4de8-83ed-d346ead990dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40119", "type": "seen", "source": "https://t.me/cvedetector/1122", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40119 - Nepstech Wifi Router CSRF: Compromised Admin Password\", \n  \"Content\": \"CVE ID : CVE-2024-40119 \nPublished : July 17, 2024, 8:15 p.m. | 37\u00a0minutes ago \nDescription : Nepstech Wifi Router xpon (terminal) model NTPL-Xpon1GFEVN v.1.0 Firmware V2.0.1 contains a Cross-Site Request Forgery (CSRF) vulnerability in the password change function, which allows remote attackers to change the admin password without the user's consent, leading to a potential account takeover. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T23:14:37.000000Z"}, {"uuid": "0f2c4830-8aa1-4ed0-8e6d-c6a88f7e9680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40116", "type": "seen", "source": "https://t.me/cvedetector/1718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40116 - Solar-Log Plain Password Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40116 \nPublished : July 26, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T23:03:26.000000Z"}, {"uuid": "d1a2a77c-77a3-4172-9753-cc9607cff65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40117", "type": "seen", "source": "https://t.me/cvedetector/1714", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40117 - Solar-Log Administrative Privilege Escalation erm\u00f6gelt \u00fcber unsichere Zugriffskontrolle\", \n  \"Content\": \"CVE ID : CVE-2024-40117 \nPublished : July 26, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T23:03:19.000000Z"}, {"uuid": "de04519f-9ff2-4451-9c2f-1170157ece3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40110", "type": "seen", "source": "https://t.me/cvedetector/784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40110 - Sourcecodester Poultry Farm Management System v1.0\", \n  \"Content\": \"CVE ID : CVE-2024-40110 \nPublished : July 12, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Sourcecodester Poultry Farm Management System v1.0 contains an Unauthenticated Remote Code Execution (RCE) vulnerability via the productimage parameter at /farm/product.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T20:17:23.000000Z"}, {"uuid": "5b750475-da27-4c86-a02e-826c732f29c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40111", "type": "published-proof-of-concept", "source": "Telegram/cGezkY-sNGeXP7suZ-_mxlbHZXJUtespjJiYiVVk1k7JN70", "content": "", "creation_timestamp": "2025-01-11T04:00:06.000000Z"}, {"uuid": "287c3b0b-21ef-44e4-bac9-fa5bc465b18d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40110", "type": "published-proof-of-concept", "source": "Telegram/POKQaQXyNcKq52FwPEf7faWTBs8oghkATFbVe9c3ZE8Mq6Q", "content": "", "creation_timestamp": "2025-04-29T05:00:07.000000Z"}]}