{"vulnerability": "CVE-2024-4130", "sightings": [{"uuid": "d49cdd1f-f583-4c73-9c9d-2c7623a867aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4130", "type": "seen", "source": "https://t.me/cvedetector/7701", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4130 - Lenovo App Store DLL Hijack Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4130 \nPublished : Oct. 11, 2024, 4:15 p.m. | 25\u00a0minutes ago \nDescription : A DLL hijack vulnerability was reported in Lenovo App Store that could allow a local attacker to execute code with elevated privileges. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T18:42:53.000000Z"}, {"uuid": "0598e0e5-aa94-418c-9b71-adbbf73bf707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41309", "type": "seen", "source": "https://t.me/cvedetector/2708", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41309 - Enjay CRM OS Escape Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41309 \nPublished : Aug. 7, 2024, 4:15 p.m. | 15\u00a0minutes ago \nDescription : An issue in the Hardware info module of IT Solutions Enjay CRM OS v1.0 allows attackers to escape the restricted terminal environment and gain root-level privileges on the underlying system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T18:38:49.000000Z"}, {"uuid": "1183a9b3-770f-4a36-aa04-8a2f3f66f21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41304", "type": "seen", "source": "https://t.me/cvedetector/2059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41304 - WonderCMS SVG File Upload Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41304 \nPublished : July 30, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the uploadFileAction() function of WonderCMS v3.4.3 allows attackers to execute arbitrary code via a crafted SVG file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T20:45:52.000000Z"}, {"uuid": "76e87cb2-76dc-47f6-b7ab-eb8d3ca58c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41305", "type": "seen", "source": "https://t.me/cvedetector/2058", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41305 - WonderCMS Server-Side Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41305 \nPublished : July 30, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : A Server-Side Request Forgery (SSRF) in the Plugins Page of WonderCMS v3.4.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T20:45:51.000000Z"}]}