{"vulnerability": "CVE-2024-4169", "sightings": [{"uuid": "8ee6dd58-667b-4c11-8396-e606a613e973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41698", "type": "seen", "source": "https://t.me/cvedetector/3613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41698 - Apache SharePoint Exposes Sensitive Information\", \n  \"Content\": \"CVE ID : CVE-2024-41698 \nPublished : Aug. 20, 2024, 12:15 p.m. | 17\u00a0minutes ago \nDescription : Priority \u2013 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T14:37:02.000000Z"}, {"uuid": "bf82b910-6187-4003-9b9f-f9d8a32c3bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41699", "type": "seen", "source": "https://t.me/cvedetector/3612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41699 - Amazon S3 Unauthorized Access to Sensitive Files\", \n  \"Content\": \"CVE ID : CVE-2024-41699 \nPublished : Aug. 20, 2024, 12:15 p.m. | 17\u00a0minutes ago \nDescription : Priority \u2013 CWE-552: Files or Directories Accessible to External Parties \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T14:37:01.000000Z"}, {"uuid": "172e8e2f-2b6b-4103-9d5d-6867a25bb1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41697", "type": "seen", "source": "https://t.me/cvedetector/3614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41697 - Microsoft Internet Explorer Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-41697 \nPublished : Aug. 20, 2024, 12:15 p.m. | 17\u00a0minutes ago \nDescription : Priority -\u00a0CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T14:37:02.000000Z"}, {"uuid": "61247b84-50c4-4987-ae7a-af9f0e9e2371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41692", "type": "seen", "source": "https://t.me/cvedetector/1685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41692 - SyroTech SY-GPON-1110-WDONT Router Physical Access Root Terminal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41692 \nPublished : July 26, 2024, 1:15 p.m. | 37\u00a0minutes ago \nDescription : This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T16:21:42.000000Z"}, {"uuid": "482018f1-451c-4155-9e50-038397365414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41690", "type": "seen", "source": "https://t.me/cvedetector/1680", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41690 - SyroTech SY-GPON-1110-WDONT Router Default Credentials Plaintext Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41690 \nPublished : July 26, 2024, 12:15 p.m. | 55\u00a0minutes ago \nDescription : This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of default username and password credentials in plaintext within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext default credentials on the vulnerable system.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T15:30:06.000000Z"}, {"uuid": "c4e73650-e79c-472c-b65f-8f1ee30f06e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41691", "type": "seen", "source": "https://t.me/cvedetector/1678", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41691 - SyroTech SY-GPON-1110-WDONT Router FTP Credentials Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41691 \nPublished : July 26, 2024, 12:15 p.m. | 55\u00a0minutes ago \nDescription : This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of FTP credentials in plaintext within the SquashFS-root filesystem associated with the router's firmware. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext FTP credentials from the vulnerable system.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the FTP server associated with the targeted system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T15:30:04.000000Z"}, {"uuid": "cfb7abd0-8905-43cc-8113-53591f6c3f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41693", "type": "seen", "source": "https://t.me/cvedetector/2025", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41693 - Mashov Web Browser - Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41693 \nPublished : July 30, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : Mashov - CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T12:23:56.000000Z"}, {"uuid": "1c11df98-b2f8-4f1b-8dcf-da83f6203a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41696", "type": "seen", "source": "https://t.me/cvedetector/2024", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41696 - Priority ERP WEB Portal Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-41696 \nPublished : July 30, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : Priority   \n  \nPRI WEB Portal\u00a0Add-On for Priority ERP on prem  \n  \n- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T12:23:55.000000Z"}, {"uuid": "7b6ddd78-00e1-4059-b267-42c4eebfdd7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41694", "type": "seen", "source": "https://t.me/cvedetector/2023", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41694 - Cybonet Authentication Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-41694 \nPublished : July 30, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : Cybonet - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T12:23:54.000000Z"}, {"uuid": "2ac098da-7d13-46eb-94d0-31569f773711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41695", "type": "seen", "source": "https://t.me/cvedetector/2022", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41695 - Cybonet Pathname Limitation Vulnerability (Path Traversal)\", \n  \"Content\": \"CVE ID : CVE-2024-41695 \nPublished : July 30, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : Cybonet - CWE-22: Improper Limitation of a Pathname to a Restricted Directory \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T12:23:53.000000Z"}]}