{"uuid": "729582a0-4098-4f4a-9a08-0abfa58f3b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6527", "type": "seen", "source": "https://t.me/cvedetector/351", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6527 - SQL Injection vulnerability in parameter \"w\" in fi\", \n  \"Content\": \"CVE ID : CVE-2024-6527 \nPublished : July 9, 2024, 2:15 p.m. | 26\u00a0minutes ago \nDescription : SQL Injection vulnerability in parameter \"w\" in file \"druk.php\" in MegaBIP software allows unauthorized attacker to\u00a0disclose the contents of the database and obtain administrator's token to modify the content of pages.\u00a0 This issue affects MegaBIP software versions through 5.13. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T16:52:09.000000Z"}