{"vulnerability": "CVE-2024-4145", "sightings": [{"uuid": "ac7649a0-819b-47e8-94d4-2d5efbff1675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41453", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsvhmaovh2b", "content": "", "creation_timestamp": "2025-01-15T23:15:40.946237Z"}, {"uuid": "3b506567-964e-47f7-bff3-a6a93bf1beb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41454", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsvhoe2ws2p", "content": "", "creation_timestamp": "2025-01-15T23:15:43.263796Z"}, {"uuid": "fe91df97-3041-4d67-ae35-b91ea4dd7663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41454", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsy53hm7p2k", "content": "", "creation_timestamp": "2025-01-16T00:03:30.052407Z"}, {"uuid": "febb8aac-6621-4147-900c-8fa7c88fbc77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41453", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsy53shhy2y", "content": "", "creation_timestamp": "2025-01-16T00:03:31.808662Z"}, {"uuid": "dc19f769-cd6f-42ef-885d-8fdc705f54ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41454", "type": "seen", "source": "https://t.me/cvedetector/15541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41454 - Process Maker Arbitary File Upload Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-41454 \nPublished : Jan. 15, 2025, 11:15 p.m. | 34\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the UI login page logo upload function of Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary code via uploading a crafted PHP or HTML file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T01:10:35.000000Z"}, {"uuid": "30e6dd37-74e5-4b6c-8d2b-585e9a67bfb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41454", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1903", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41454\n\ud83d\udd39 Description: An arbitrary file upload vulnerability in the UI login page logo upload function of Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary code via uploading a crafted PHP or HTML file.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T22:55:41.016111\n\ud83d\udd17 References:\n1. https://github.com/php-lover-boy/processmaker", "creation_timestamp": "2025-01-15T23:54:36.000000Z"}, {"uuid": "a52a8497-979a-4137-8e57-7e48394f14bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41453", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1902", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41453\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T22:56:14.027030\n\ud83d\udd17 References:\n1. https://github.com/php-lover-boy/processmaker", "creation_timestamp": "2025-01-15T23:54:36.000000Z"}, {"uuid": "1162b21a-3b9c-4629-b543-f01527dc46ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41453", "type": "seen", "source": "https://t.me/cvedetector/15540", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41453 - Process Maker pm4core-docker XSS\", \n  \"Content\": \"CVE ID : CVE-2024-41453 \nPublished : Jan. 15, 2025, 11:15 p.m. | 34\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T01:10:34.000000Z"}, {"uuid": "cd85b765-4a18-4156-908c-6766ddff9bfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41459", "type": "seen", "source": "https://t.me/cvedetector/1609", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41459 - Tenda FH1201 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41459 \nPublished : July 24, 2024, 9:15 p.m. | 41\u00a0minutes ago \nDescription : Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the PPPOEPassword parameter at ip/goform/QuickIndex. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T00:10:53.000000Z"}]}