{"vulnerability": "cve-2024-4814", "sightings": [{"uuid": "8b1373a3-9e5f-4af0-aac8-207c10e610f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48142", "type": "seen", "source": "https://t.me/cvedetector/8834", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48142 - Butterfly Effect Limited Monica ChatGPT AI Assistant Chatbox Prompt Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48142 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A prompt injection vulnerability in the chatbox of Butterfly Effect Limited Monica ChatGPT AI Assistant v2.4.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:38.000000Z"}, {"uuid": "341e81fe-629d-421a-8620-af817ecbeb02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48145", "type": "seen", "source": "https://t.me/cvedetector/8838", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48145 - Netangular Technologies ChatNet Chatbox Prompt Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48145 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A prompt injection vulnerability in the chatbox of Netangular Technologies ChatNet AI Version v1.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:44.000000Z"}, {"uuid": "a332dc07-f82b-4a95-8d4e-69f5300b809e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48144", "type": "seen", "source": "https://t.me/cvedetector/8837", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48144 - Fusion Chat Chat AI Assistant Prompt Injection Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-48144 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A prompt injection vulnerability in the chatbox of Fusion Chat Chat AI Assistant Ask Me Anything v1.2.4.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:43.000000Z"}, {"uuid": "d1ad6c7a-5c00-4196-b270-95658f78b2dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48143", "type": "seen", "source": "https://t.me/cvedetector/8836", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48143 - Digitory Multi Channel Integrated POS Brute Force Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48143 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A lack of rate limiting in the OTP validation component of Digitory Multi Channel Integrated POS v1.0 allows attackers to gain access to the ordering system and place an excessive amount of food orders. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:39.000000Z"}, {"uuid": "ec1b7b6c-06e0-4f63-b9e2-f927667d1137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48141", "type": "seen", "source": "https://t.me/cvedetector/8835", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48141 - Zhipu AI CodeGeeX Chatbox SQLInject\", \n  \"Content\": \"CVE ID : CVE-2024-48141 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A prompt injection vulnerability in the chatbox of Zhipu AI CodeGeeX v2.17.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:39.000000Z"}, {"uuid": "32560b65-443c-4ba5-9887-7c7eb63138a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48140", "type": "seen", "source": "https://t.me/cvedetector/8832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48140 - Butterfly Effect Limited Monica Your AI Copilot Chatbox Prompt Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48140 \nPublished : Oct. 24, 2024, 7:15 p.m. | 33\u00a0minutes ago \nDescription : A prompt injection vulnerability in the chatbox of Butterfly Effect Limited Monica Your AI Copilot powered by ChatGPT4 v6.3.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:50:36.000000Z"}]}