{"uuid": "91b1c21b-2537-47bf-b733-fc753f0fc08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12641", "type": "seen", "source": "https://t.me/cvedetector/12974", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12641 - Chunghwa Telecom TenderDocTransfer Cross-Site Scripting (XSS) and Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12641 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user\u2019s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:56.000000Z"}