{"vulnerability": "CVE-2024-4112", "sightings": [{"uuid": "8fee6632-db3e-42b6-9e43-e5b7ac125f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41126", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113556358006944409", "content": "", "creation_timestamp": "2024-11-27T18:35:14.365782Z"}, {"uuid": "01e7359d-9354-483d-9c32-fd048fb21aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41125", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113556357993210876", "content": "", "creation_timestamp": "2024-11-27T18:35:13.960575Z"}, {"uuid": "1931c950-fbe4-40e3-ab6b-fd3dd52725b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41120", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m33w736i3c26", "content": "", "creation_timestamp": "2025-10-13T19:11:53.713215Z"}, {"uuid": "480d50d5-aa41-45bc-8a61-8be1d261575b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41123", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeuxkcgj2c", "content": "", "creation_timestamp": "2025-09-30T01:31:30.864568Z"}, {"uuid": "311b7b96-1a60-40e4-a1a2-ac870396d267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41120", "type": "seen", "source": "https://t.me/cvedetector/1724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41120 - Streamlit-Geospatial Blind Server-Side Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41120 \nPublished : July 26, 2024, 9:15 p.m. | 34\u00a0minutes ago \nDescription : streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 63 of `pages/9_\ud83d\udd32_Vector_Data_Visualization.py` takes user input, which is later passed to the `gpd.read_file` method. `gpd.read_file` method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T23:53:40.000000Z"}, {"uuid": "cbc318f5-59d6-4e07-a1b9-69502c4eb926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41128", "type": "seen", "source": "https://t.me/cvedetector/8114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41128 - Ruby on Rails Action Pack ReDoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41128 \nPublished : Oct. 16, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : Action Pack is a framework for handling and responding to web requests. Starting in version 3.1.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to version 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may use Ruby 3.2 as a workaround. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T21:24:43.000000Z"}, {"uuid": "abfaf25a-f202-4cfd-a035-b83e1c7f2234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41127", "type": "seen", "source": "https://t.me/cvedetector/2354", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41127 - Monkeytype Code Injection Vulnerability (Pipeline Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-41127 \nPublished : Aug. 2, 2024, 3:16 p.m. | 42\u00a0minutes ago \nDescription : Monkeytype is a minimalistic and customizable typing test. Monkeytype is vulnerable to Poisoned Pipeline Execution through Code Injection in its ci-failure-comment.yml GitHub Workflow, enabling attackers to gain pull-requests write access. The ci-failure-comment.yml workflow is triggered when the Monkey CI workflow completes. When it runs, it will download an artifact uploaded by the triggering workflow and assign the contents of ./pr_num/pr_num.txt artifact to the steps.pr_num_reader.outputs.content WorkFlow variable. It is not validated that the variable is actually a number and later it is interpolated into a JS script allowing an attacker to change the code to be executed. This issue leads to pull-requests write access. This vulnerability is fixed in 24.30.0. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-02T18:11:56.000000Z"}, {"uuid": "e746cf7c-365f-4973-a0d4-084136b65d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41123", "type": "seen", "source": "https://t.me/cvedetector/2239", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41123 - REXML XML Toolkit DoS Vulnerability in Ruby\", \n  \"Content\": \"CVE ID : CVE-2024-41123 \nPublished : Aug. 1, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `&gt;]` and `]&gt;`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:55:54.000000Z"}, {"uuid": "7911e1b9-4f57-4543-819c-9ec09b3dc119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41124", "type": "seen", "source": "https://t.me/cvedetector/1234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41124 - Puncia: Unsecured API URLs in Subdomain Center &amp; Exploit Observer lead to Insecure Data Transmission\", \n  \"Content\": \"CVE ID : CVE-2024-41124 \nPublished : July 19, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : Puncia is the Official CLI utility for Subdomain Center &amp; Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, Unauthorized Data Access &amp; MITM Attacks. This issue has been addressed in release version 0.21 by using https rather than http connections. All users are advised to upgrade. There is no known workarounds for this vulnerability. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T22:53:54.000000Z"}, {"uuid": "1ca3df83-a925-4874-a4dd-ac5f904b25d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41129", "type": "seen", "source": "https://t.me/cvedetector/1457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41129 - \"Ops Library Kerberos Secret Exfiltration Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-41129 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : The ops library is a Python framework for developing and testing Kubernetes and machine charms. The issue here is that ops passes the secret content as one of the args via CLI. This issue may affect any of the charms that are using: Juju (&gt;=3.0), Juju secrets and not correctly capturing and processing `subprocess.CalledProcessError`. This vulnerability is fixed in 2.15.0. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:49:59.000000Z"}, {"uuid": "fb87327f-a6db-4f51-b862-39ec7a74b3af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41122", "type": "seen", "source": "https://t.me/cvedetector/1233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41122 - Woodpecker Unauthenticated Remote Code Execution and Secret Exfiltration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41122 \nPublished : July 19, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T22:53:53.000000Z"}, {"uuid": "fc95ba76-ff2d-4c0d-806e-bda310e71de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41121", "type": "seen", "source": "https://t.me/cvedetector/1231", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41121 - Woodpecker Unauthenticated User Creation Allows Host Takeover and Secret Extraction\", \n  \"Content\": \"CVE ID : CVE-2024-41121 \nPublished : July 19, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T22:53:51.000000Z"}]}