{"vulnerability": "CVE-2020-26624", "sightings": [{"uuid": "c8ae3ed1-f9eb-47f8-ab6d-d5378b106988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/cibsecurity/74206", "content": "\u203c\ufe0fCVE-2020-26624\u203c\ufe0f\n\nA SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the ID parameter after the login portal.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:43.000000Z"}, {"uuid": "2b4d9fb5-2cd6-4cf0-88b1-d5a28271d014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/171942", "content": "https://ift.tt/aw2T83l\nCVE-2020-26624 | Gila CMS up to 1.15.4 Login Portal ID sql injection (ID 176301)", "creation_timestamp": "2024-01-23T13:31:50.000000Z"}, {"uuid": "a130e917-525b-4e51-a2de-08bd1bbdb918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/162088", "content": "https://ift.tt/3hzAbeI\nCVE-2020-26624", "creation_timestamp": "2024-01-02T23:26:49.000000Z"}, {"uuid": "a96256f9-34f4-49ce-9af1-7bf83a3ba4cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/164841", "content": "https://ift.tt/BGd6FSJ\nCVE-2020-26624 Exploit", "creation_timestamp": "2024-01-09T08:16:05.000000Z"}]}