{"vulnerability": "CVE-2024-4283", "sightings": [{"uuid": "62a34813-d06d-42b6-b798-695336f59a3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42834", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113477324778603065", "content": "", "creation_timestamp": "2024-11-13T19:36:02.653983Z"}, {"uuid": "597a7b14-7657-48eb-bec3-d87966566374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42835", "type": "seen", "source": "https://t.me/cvedetector/9506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42835 - Langflow PythonCodeTool Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42835 \nPublished : Oct. 31, 2024, 2:15 p.m. | 44\u00a0minutes ago \nDescription : langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T16:06:27.000000Z"}, {"uuid": "b1bf4800-7adb-44fd-b718-a86251ad2aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42831", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llwsema3by23", "content": "", "creation_timestamp": "2025-04-03T21:02:11.253306Z"}, {"uuid": "5a615065-b7a5-4aa2-aff1-892846e77855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42834", "type": "seen", "source": "https://t.me/cvedetector/10872", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42834 - A stored cross-site scripting (XSS) vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42834 \nPublished : Nov. 13, 2024, 8:15 p.m. | 39\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability in the Create Customer API in Incognito Service Activation Center (SAC) UI v14.11 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the lastName parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T22:15:22.000000Z"}, {"uuid": "8167b5aa-7179-4c52-8cb0-027593742330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42831", "type": "seen", "source": "https://t.me/cvedetector/7254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42831 - Elaine's Realtime CRM Automation XSS\", \n  \"Content\": \"CVE ID : CVE-2024-42831 \nPublished : Oct. 7, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability in Elaine's Realtime CRM Automation v6.18.17 allows attackers to execute arbitrary JavaScript code in the web browser of a user via injecting a crafted payload into the dialog parameter at wrapper_dialog.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T20:58:56.000000Z"}, {"uuid": "a6074718-8cc9-4896-be77-0260419d27d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4283", "type": "seen", "source": "https://t.me/cvedetector/5772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4283 - GitLab EE OAuth Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4283 \nPublished : Sept. 16, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T01:23:56.000000Z"}]}