{"vulnerability": "CVE-2024-4708", "sightings": [{"uuid": "98b6bb91-870b-4dcf-b0ee-1f90aefa8804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lqqhsmkhe52s", "content": "", "creation_timestamp": "2025-06-03T23:43:07.151818Z"}, {"uuid": "b42f4530-29d8-4f78-b4e3-aa3af0d187d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lt7ukfgxgs2l", "content": "", "creation_timestamp": "2025-07-05T13:31:30.493398Z"}, {"uuid": "5898174a-0da8-4a47-96ac-1be807aa6ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "b8b180e4-c7f6-4e51-8612-86058ee6e27f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/206", "content": "", "creation_timestamp": "2025-06-03T21:21:02.000000Z"}, {"uuid": "fafb3da3-790b-4eb3-9539-eb77faa07bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/betterhn50.e-work.xyz/post/3lqqwzkvoz72l", "content": "", "creation_timestamp": "2025-06-04T04:15:26.483254Z"}, {"uuid": "332af9b7-8284-48a1-a96e-92d8d070ab83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hackernewsrobot.bsky.social/post/3lqqxzizrqj2i", "content": "", "creation_timestamp": "2025-06-04T04:33:18.845031Z"}, {"uuid": "c60c3d20-26c2-4e07-bda1-aa802fcc4858", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "deb41a62-197d-4ed7-8c89-87c8f97812b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/204", "content": "", "creation_timestamp": "2025-06-03T15:12:21.000000Z"}, {"uuid": "803fd997-a473-451f-9bef-19261070a092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "cdf07585-f80c-404d-8d17-af11954cbd8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lqqq5dgirf2a", "content": "", "creation_timestamp": "2025-06-04T02:12:15.976278Z"}, {"uuid": "6d00feee-1647-4347-ae7f-ad31a6655b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "aaae938b-0341-46c0-bc7e-a6da29cf38c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/xaolanx/4c88d0cbc0dee90764bae767006103f8", "content": "", "creation_timestamp": "2025-07-11T02:03:34.000000Z"}, {"uuid": "217d4088-d84d-4aa7-8d36-d07e17e9f5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lqrc7uy3wc2h", "content": "", "creation_timestamp": "2025-06-04T07:35:49.048146Z"}, {"uuid": "0a7bf02b-97d5-407a-be27-8d22e8bb46c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "4a8b92eb-7872-46ad-8f14-6fc98df3c444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/topickapp.bsky.social/post/3lqrl52ec3s2l", "content": "", "creation_timestamp": "2025-06-04T10:15:18.033331Z"}, {"uuid": "20edc7b0-fabc-407e-a2ce-514d710aaa32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "03942be7-e45a-419e-9ef6-a0b9ac555c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lqse5pynuo2u", "content": "", "creation_timestamp": "2025-06-04T17:43:06.124648Z"}, {"uuid": "a3a07440-84f7-4129-a74b-94421f2c2475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "57a08078-a0e3-4059-9af7-05e4d3a72fba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "61bb09e5-10b3-4799-bd17-743be07ef2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3ltckutjk7c27", "content": "", "creation_timestamp": "2025-07-06T15:16:24.306451Z"}, {"uuid": "a62d28e7-4e59-47dc-810c-1df6f3272c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "474106c2-1fe3-45bc-b7fa-57476d471032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://schleuss.online/users/vulnbot/statuses/114619684333161709", "content": "", "creation_timestamp": "2025-06-03T13:33:06.498964Z"}, {"uuid": "b99033a3-654f-4da6-bf27-499e7efb36ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "b91b799e-31c0-45eb-8018-6ce14253206a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/212", "content": "", "creation_timestamp": "2025-06-04T15:21:18.000000Z"}, {"uuid": "afb4d773-2297-4107-88ae-6afeda367967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lqpkpiimav2d", "content": "", "creation_timestamp": "2025-06-03T15:02:23.110259Z"}, {"uuid": "c2efc55c-79d9-42f7-b58c-7f5c5aa2ad6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lqphkawc2e22", "content": "", "creation_timestamp": "2025-06-03T14:05:46.841880Z"}, {"uuid": "687054e7-547e-4da7-8213-59697644cb3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "573156f4-b581-49d8-bc08-95e21716f912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "1c86954b-628f-4d43-9415-70c7699c3eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "16bcc200-e5bb-433c-8021-3ecfa672203d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lqpub5eaov2z", "content": "", "creation_timestamp": "2025-06-03T17:53:19.262489Z"}, {"uuid": "c597d88f-ac62-4bc2-84ad-c46a64db0d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/developerfred/31dd05c34ea92dfff7a845a6d56bd25d", "content": "", "creation_timestamp": "2026-01-11T21:52:01.000000Z"}, {"uuid": "2c54fe79-8139-4c03-a477-906204b11d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hn100.bsky.social/post/3lqq34o4mcp2k", "content": "", "creation_timestamp": "2025-06-03T19:56:06.717686Z"}, {"uuid": "3185082c-b78a-4065-b42a-48eefb3cd53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hnws.bsky.social/post/3lqq37wqizg2j", "content": "", "creation_timestamp": "2025-06-03T19:57:54.925963Z"}, {"uuid": "0738b5c5-55ee-45ac-a50e-4e16056e5c3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lqq3do2qdk2f", "content": "", "creation_timestamp": "2025-06-03T20:00:03.985711Z"}, {"uuid": "49708c0d-9fd2-4df9-9307-67ba67ffee38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hnbot.gsuscs.xyz/post/3lqq3dt2kls2z", "content": "", "creation_timestamp": "2025-06-03T20:00:05.343650Z"}, {"uuid": "d241385e-73a1-4d8b-bf9b-3ca7560f77c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3me4niaiey32j", "content": "", "creation_timestamp": "2026-02-05T14:55:18.506324Z"}, {"uuid": "a04b1269-6d02-4fe9-b2f4-e29ee058bc45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/207", "content": "", "creation_timestamp": "2025-06-03T23:46:48.000000Z"}, {"uuid": "c2f7e018-e404-43d7-85a0-63077ec5335f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hnews.southla.social/post/3lqq4zn224k2o", "content": "", "creation_timestamp": "2025-06-03T20:30:11.270877Z"}, {"uuid": "6f46825e-b134-4bdd-bd38-5d4eb69ef539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hackernewsbot.bsky.social/post/3lqq5lek45r2i", "content": "", "creation_timestamp": "2025-06-03T20:40:05.835673Z"}, {"uuid": "9eab71b8-386d-40f0-b893-b1fa5fc9cbc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/hackernewstop5.bsky.social/post/3lqq5mtoji423", "content": "", "creation_timestamp": "2025-06-03T20:40:55.100121Z"}, {"uuid": "ec6c88f3-5ab5-4588-b5e2-23b7aea35da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/betterhn20.e-work.xyz/post/3lqq6giqtol2z", "content": "", "creation_timestamp": "2025-06-03T20:55:16.141294Z"}, {"uuid": "4864e399-29dd-4585-8b66-24336e8384d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/Token-Eater/a4d1d6ce67e8450e1a8f456b468e3599", "content": "", "creation_timestamp": "2025-11-05T11:48:09.000000Z"}, {"uuid": "a2e115a0-4861-40c1-9d02-ded622da810c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/Token-Eater/3d3edb1aabe326b71377581a9ce3b805", "content": "", "creation_timestamp": "2025-11-05T11:55:10.000000Z"}, {"uuid": "a30f2291-5e29-4fdc-81a8-535a8de316c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lvuzndgdw42x", "content": "", "creation_timestamp": "2025-08-08T10:18:53.516585Z"}, {"uuid": "5cd1c4ec-ecde-427b-b8f1-e873db530782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lvuznkhrsfq2", "content": "", "creation_timestamp": "2025-08-08T10:19:18.209139Z"}, {"uuid": "f955d9f2-f29f-4a04-8d49-c30688dec62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lvvwaan7k22t", "content": "", "creation_timestamp": "2025-08-08T18:50:34.995906Z"}, {"uuid": "18eca003-d40a-4e71-90a0-c6d6ac3c0be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/Darkcrai86/43cb7575459ddae3fd84494950558e5a", "content": "", "creation_timestamp": "2025-09-23T15:00:33.000000Z"}, {"uuid": "b02236be-1b8a-4c1a-b5cb-78446fdc7765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://gist.github.com/developerfred/1fd4258aa5c8d5c56cfadf9115b844a4", "content": "", "creation_timestamp": "2026-01-11T21:54:25.000000Z"}, {"uuid": "ccdb618d-6aba-404a-a7c7-d2acdb4453b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a5ae6fa3-504b-4d03-a153-b9f12f911f71", "content": "", "creation_timestamp": "2025-06-04T05:03:44.190775Z"}, {"uuid": "88e85fd3-34b8-4600-87c3-4a4961d27ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47081", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17750", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47081\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.\n\ud83d\udccf Published: 2025-06-09T17:57:47.731Z\n\ud83d\udccf Modified: 2025-06-09T18:40:40.996Z\n\ud83d\udd17 References:\n1. https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7\n2. https://github.com/psf/requests/pull/6965\n3. https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef\n4. https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\n5. https://seclists.org/fulldisclosure/2025/Jun/2", "creation_timestamp": "2025-06-09T19:48:12.000000Z"}, {"uuid": "6d684d9a-f02f-4f37-808c-7c51f640c42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-47081", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "e1ff41ff-1790-4781-bc23-812e5d55d7e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47082", "type": "seen", "source": "https://t.me/cvedetector/6358", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47082 - Strawberry GraphQL CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47082 \nPublished : Sept. 25, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, multipart file upload support as defined in the GraphQL multipart request specification was enabled by default in all Strawberry HTTP view integrations. This made all Strawberry HTTP view integrations vulnerable to cross-site request forgery (CSRF) attacks if users did not explicitly enable CSRF preventing security mechanism for their servers. Additionally, the Django HTTP view integration, in particular, had an exemption for Django's built-in CSRF protection (i.e., the `CsrfViewMiddleware` middleware) by default. In affect, all Strawberry integrations were vulnerable to CSRF attacks by default. Version `v0.243.0` is the first `strawberry-graphql` including a patch. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T21:03:43.000000Z"}, {"uuid": "0177f49c-04c6-4e5d-b025-4e251aa3ed55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47084", "type": "seen", "source": "https://t.me/cvedetector/7644", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47084 - Gradio CORS Origin Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47084 \nPublished : Oct. 10, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker\u2019s website to make unauthorized requests to a local Gradio server. Potentially, attackers can upload files, steal authentication tokens, and access user data if the victim visits a malicious website while logged into Gradio. This impacts users who have deployed Gradio locally and use basic authentication. Users are advised to upgrade to `gradio&gt;4.44` to address this issue. As a workaround, users can manually enforce stricter CORS origin validation by modifying the `CustomCORSMiddleware` class in their local Gradio server code. Specifically, they can bypass the condition that skips CORS validation for requests containing cookies to prevent potential exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T01:07:55.000000Z"}, {"uuid": "25c392b1-8d8e-4702-8dd8-ac60acbb52ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47083", "type": "seen", "source": "https://t.me/cvedetector/6361", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47083 - Power Platform Terraform Provider Unmasked Client Secret Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-47083 \nPublished : Sept. 25, 2024, 10:15 p.m. | 40\u00a0minutes ago \nDescription : Power Platform Terraform Provider allows managing environments and other resources within Power Platform. Versions prior to 3.0.0 have an issue in the Power Platform Terraform Provider where sensitive information, specifically the `client_secret` used in the service principal authentication, may be exposed in logs. This exposure occurs due to an error in the logging code that causes the `client_secret` to not be properly masked when logs are persisted or viewed. Users should upgrade to version 3.0.0 to receive a patched version of the provider that removes all logging of sensitive content. Users who have used this provider with the affected versions should take the following additional steps to mitigate the risk: Immediately rotate the `client_secret` for any service principal that has been configured using this Terraform provider. This will invalidate any potentially exposed secrets. Those who have set the `TF_LOG_PATH` environment variable or configured Terraform to persist logs to a file or an external system, consider disabling this until they have updated to a fixed version of the provider. Those who have existing logs that may contain the `client_secret` should remove or sanitize these logs to prevent unauthorized access. This includes logs on disk, in monitoring systems, or in logging services. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T01:14:45.000000Z"}, {"uuid": "e0f87dc2-ed02-4894-9c44-1b105c3d7252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47089", "type": "seen", "source": "https://t.me/cvedetector/6046", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47089 - Apex Softcell LD Geo Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47089 \nPublished : Sept. 19, 2024, 7:15 a.m. | 41\u00a0minutes ago \nDescription : This vulnerability exists in the Apex Softcell LD Geo due to improper validation of the transaction token ID in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating the transaction token ID in the API request leading to unauthorized access and modification of transactions belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T10:18:22.000000Z"}, {"uuid": "a1521399-e26e-4de1-a8c3-67db469a114d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47080", "type": "seen", "source": "https://t.me/cvedetector/7925", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47080 - \"Matrix JS SDK Unverified Shared History Key Interception Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47080 \nPublished : Oct. 15, 2024, 3:15 p.m. | 29\u00a0minutes ago \nDescription : matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers.  The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these \"shared\" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected by this vulnerability, because `MatrixClient.sendSharedHistoryKeys()` raises an exception in such environments. The vulnerability was fixed in matrix-js-sdk 34.8.0 by removing the vulnerable functionality. As a workaround, remove use of affected functionality from clients. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-15T17:46:36.000000Z"}, {"uuid": "4f837121-5d07-4150-afba-8b126189bbb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47088", "type": "seen", "source": "https://t.me/cvedetector/6045", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47088 - Apex Softcell LD Geo Brute Force Authentication Bypass vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47088 \nPublished : Sept. 19, 2024, 7:15 a.m. | 41\u00a0minutes ago \nDescription : This vulnerability exists in Apex Softcell LD Geo due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack on login OTP, which could lead to gain unauthorized access to other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T10:18:21.000000Z"}, {"uuid": "87e774f0-8e76-4c2e-90ca-17c24d0a2956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47087", "type": "seen", "source": "https://t.me/cvedetector/6044", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47087 - Apex Softcell LD Geo Information Disclosure RCE\", \n  \"Content\": \"CVE ID : CVE-2024-47087 \nPublished : Sept. 19, 2024, 7:15 a.m. | 41\u00a0minutes ago \nDescription : This vulnerability exists in Apex Softcell LD Geo due to improper validation of the certain parameters (Client ID, DPID or BOID) in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating parameters in the API request body leading to exposure of sensitive information belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T10:18:20.000000Z"}, {"uuid": "6c99c20b-7524-43b4-85a8-2e3ccbcf0860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47085", "type": "seen", "source": "https://t.me/cvedetector/6043", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47085 - Oracle LD DP Back Office Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47085 \nPublished : Sept. 19, 2024, 6:15 a.m. | 21\u00a0minutes ago \nDescription : This vulnerability exists in LD DP Back Office due to improper validation of certain parameters \u201ccCdslClicentcode\u201d and \u201ccLdClientCode\u201d in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating parameters in the API request body leading to exposure of sensitive information belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T08:38:04.000000Z"}, {"uuid": "02aff69e-a249-4238-9a22-9e3e0bd51807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47086", "type": "seen", "source": "https://t.me/cvedetector/6042", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47086 - Oracle NetSuite LD DP Back Office OTP Verification Bypass Remote Authentication Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47086 \nPublished : Sept. 19, 2024, 6:15 a.m. | 21\u00a0minutes ago \nDescription : This vulnerability exists in LD DP Back Office due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by providing arbitrary OTP value for authentication and subsequently changing its API response.    \n  \nSuccessful exploitation of this vulnerability could allow the attacker to bypass OTP verification for other user accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T08:38:03.000000Z"}]}