{"vulnerability": "CVE-2024-4191", "sightings": [{"uuid": "d0d8f34a-b2ae-4e85-a7e3-c6f3c0508ad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41917", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4169", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41917\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T22:15:38.160\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01230.html", "creation_timestamp": "2025-02-12T23:12:24.000000Z"}, {"uuid": "aa49fd4e-279f-4aa7-a9ea-b8a58654e6b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41917", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7dagu7o2x", "content": "", "creation_timestamp": "2025-02-12T22:18:33.436449Z"}, {"uuid": "9097e889-4589-4031-8820-29b945d1e644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41917", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993803317992959", "content": "", "creation_timestamp": "2025-02-13T00:43:19.826185Z"}, {"uuid": "ab9c18c7-a6c9-4bef-ac27-52f683571809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41917", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "9919c340-1e24-4019-bf44-57c5dace8e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41917", "type": "seen", "source": "https://t.me/cvedetector/17950", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41917 - Intel(R) Battery Life Diagnostic Tool TOCTOU Race Condition Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41917 \nPublished : Feb. 12, 2025, 10:15 p.m. | 52\u00a0minutes ago \nDescription : Time-of-check time-of-use race condition for some Intel(R) Battery Life Diagnostic Tool software before version 2.4.1 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T00:26:11.000000Z"}, {"uuid": "1c15d694-1f36-493c-a3d6-afc208e8327e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41912", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7507", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41912\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls.\n\ud83d\udccf Published: 2024-08-07T19:54:47.266Z\n\ud83d\udccf Modified: 2025-03-13T20:26:13.846Z\n\ud83d\udd17 References:\n1. https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958", "creation_timestamp": "2025-03-13T20:43:19.000000Z"}, {"uuid": "347618d1-bab9-4458-b9a7-4405d18ff528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41914", "type": "seen", "source": "https://t.me/cvedetector/1564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41914 - EdgeConnect SD-WAN Orchestrator Authenticated Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-41914 \nPublished : July 24, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T18:19:10.000000Z"}, {"uuid": "52c60c87-83e5-4c29-951b-24aa82b07f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41918", "type": "seen", "source": "https://t.me/cvedetector/4369", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41918 - Rakuten Ichiba App URL Scheme Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-41918 \nPublished : Aug. 29, 2024, 3:15 a.m. | 37\u00a0minutes ago \nDescription : 'Rakuten Ichiba App' for Android 12.4.0 and earlier and 'Rakuten Ichiba App' for iOS 11.7.0 and earlier are vulnerable to improper authorization in handler for custom URL scheme. An arbitrary site may be displayed on the WebView of the product via Intent from another application installed on the user's device. As a result, the user may be redirected to an unauthorized site, and the user may become a victim of a phishing attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-29T06:10:58.000000Z"}, {"uuid": "083178b3-cf43-43be-bc38-9a2f83daae1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41913", "type": "seen", "source": "https://t.me/cvedetector/2593", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41913 - Poly Clariti Manager Unsanitized Input Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-41913 \nPublished : Aug. 6, 2024, 2:16 p.m. | 17\u00a0minutes ago \nDescription : A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices.  The firmware flaw does not properly sanitize User input. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T16:41:39.000000Z"}, {"uuid": "7a7c7604-02bb-4704-bd16-2397265e1d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41911", "type": "seen", "source": "https://t.me/cvedetector/2592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41911 - Poly Clariti Manager Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-41911 \nPublished : Aug. 6, 2024, 2:16 p.m. | 17\u00a0minutes ago \nDescription : A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T16:41:38.000000Z"}, {"uuid": "bfe2b2f0-9d4d-4915-96ca-9991ec21f3b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41910", "type": "seen", "source": "https://t.me/cvedetector/2590", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41910 - Poly Clariti Manager Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41910 \nPublished : Aug. 6, 2024, 2:16 p.m. | 17\u00a0minutes ago \nDescription : A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices.  The firmware contained multiple XXS vulnerabilities in the version of JavaScript used. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T16:41:36.000000Z"}, {"uuid": "50d2b3f1-4b7b-46f7-b6a7-0df4bd62b0f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41912", "type": "seen", "source": "https://t.me/cvedetector/2734", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41912 - Poly Clariti Manager Unauthenticated Access Control Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41912 \nPublished : Aug. 7, 2024, 8:15 p.m. | 31\u00a0minutes ago \nDescription : A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T22:50:32.000000Z"}, {"uuid": "0c0a5d5d-59bc-46d3-8355-bba9922c0d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41915", "type": "seen", "source": "https://t.me/cvedetector/2053", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41915 - Aruba ClearPass Policy Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41915 \nPublished : July 30, 2024, 5:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T19:55:45.000000Z"}, {"uuid": "2c5bce78-9b72-492d-8720-7fedfaf3253b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41916", "type": "seen", "source": "https://t.me/cvedetector/2051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41916 - ClearPass Policy Manager Administrative Credentials Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-41916 \nPublished : July 30, 2024, 5:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T19:55:42.000000Z"}]}