{"vulnerability": "cve-2024-9101", "sightings": [{"uuid": "46f03bda-15f8-4c50-9c95-b43a1f900d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9101", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo2oyx6342b", "content": "", "creation_timestamp": "2024-12-19T14:15:36.185169Z"}, {"uuid": "c497828a-0022-4dcd-9f85-81d2f44b7594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9101", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679798764647197", "content": "", "creation_timestamp": "2024-12-19T13:47:50.506661Z"}, {"uuid": "0e072b75-1758-4f95-936c-c1681a7bf023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9101", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "a693c14e-4d68-4331-b68d-ceb20dcdb1ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9101", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "8480a44f-5103-41cb-86c9-5b131d5bdb01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9101", "type": "seen", "source": "https://t.me/cvedetector/13329", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9101 - phpLDAPadmin XSS in Entry Chooser\", \n  \"Content\": \"CVE ID : CVE-2024-9101 \nPublished : Dec. 19, 2024, 2:15 p.m. | 22\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T15:39:20.000000Z"}]}