{"uuid": "14e1853c-ed58-492c-a38c-a525543636f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9903", "type": "seen", "source": "https://t.me/HackerArsenal/545", "content": "\u203c\ufe0f CVE-2024-9903 \u203c\ufe0f\n\nA vulnerability classified as critical has been found in 07FLYCMS, 07FLYCMS and 07FlyCRM up to 1.2.0. This affects the function fileUpload of the file adminFilefileUpload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The affected product is known with different names like 07FLYCMS, 07FLYCMS, and 07FlyCRM. It was not possible to reach out to the vendor before assigning a CVE due to a not working mail address.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-10-13T14:10:43.000000Z"}