{"vulnerability": "CVE-2024-1020", "sightings": [{"uuid": "eb93d54c-09cf-44a7-9186-aea7edf80921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10200", "type": "seen", "source": "https://t.me/cvedetector/8450", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10200 - Wellchoose Administrative Management System Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10200 \nPublished : Oct. 21, 2024, 4:15 a.m. | 32\u00a0minutes ago \nDescription : Administrative Management System from Wellchoose has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to download arbitrary files on the server. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T06:48:13.000000Z"}, {"uuid": "f4556926-31fa-4938-8e35-800d10b827b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1020", "type": "seen", "source": "https://t.me/ctinow/175600", "content": "https://ift.tt/6iOm3LW\nCVE-2024-1020", "creation_timestamp": "2024-01-29T23:31:09.000000Z"}, {"uuid": "89798aac-67fd-467c-8f43-11682a2b0252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10205", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113665610354857458", "content": "", "creation_timestamp": "2024-12-17T01:39:32.579636Z"}, {"uuid": "2cda7778-66ee-4fdc-9b8f-8fddaa6134f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10205", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ldnut5ltpz24", "content": "", "creation_timestamp": "2024-12-19T12:30:33.495875Z"}, {"uuid": "64c448af-7c2f-4db2-b3ce-1dfae6c14139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10208", "type": "seen", "source": "https://t.me/cvedetector/21045", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10208 - B&amp;R APROL Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-10208 \nPublished : March 25, 2025, 5:15 a.m. | 23\u00a0minutes ago \nDescription : An Improper Neutralization of Input During Web Page Generation vulnerability in the APROL Web Portal used in B&amp;R APROL &lt;4.4-00p5\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T06:57:07.000000Z"}, {"uuid": "fe0267f6-3d2b-4ddb-af56-abe389d552fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10209", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-093-05", "content": "", "creation_timestamp": "2025-04-03T10:00:00.000000Z"}, {"uuid": "20481c20-0dfa-421f-b0c3-d24de452131d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10206", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-093-05", "content": "", "creation_timestamp": "2025-04-03T10:00:00.000000Z"}, {"uuid": "68a1ea28-5cba-47fb-b11d-96ed81df15a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10207", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-093-05", "content": "", "creation_timestamp": "2025-04-03T10:00:00.000000Z"}, {"uuid": "b0a2edf9-8a65-44a1-8208-699687365c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10208", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-093-05", "content": "", "creation_timestamp": "2025-04-03T10:00:00.000000Z"}, {"uuid": "bfccd97d-a5cd-4cfc-896f-23dbffe2e152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10209", "type": "seen", "source": "https://t.me/cvedetector/21048", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10209 - B&amp;R APROL File System Incorrect Permission Assignment Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10209 \nPublished : March 25, 2025, 5:15 a.m. | 23\u00a0minutes ago \nDescription : An Incorrect Permission Assignment for Critical Resource vulnerability in the file system used in B&amp;R APROL &lt;4.4-01\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T06:57:13.000000Z"}, {"uuid": "6dc79270-e02a-46cf-812c-a4e0c30944de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10206", "type": "seen", "source": "https://t.me/cvedetector/21047", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10206 - B&amp;R APROL SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-10206 \nPublished : March 25, 2025, 5:15 a.m. | 23\u00a0minutes ago \nDescription : A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&amp;R APROL &lt;4.4-00p5\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T06:57:09.000000Z"}, {"uuid": "35059419-0edf-43c3-9988-aae45d651330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10207", "type": "seen", "source": "https://t.me/cvedetector/21044", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10207 - B&amp;R APROL Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-10207 \nPublished : March 25, 2025, 5:15 a.m. | 23\u00a0minutes ago \nDescription : A Server-Side Request Forgery vulnerability in the APROL Web Portal used in B&amp;R APROL &lt;4.4-00p5\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T06:57:07.000000Z"}, {"uuid": "f5191622-30cc-4cf1-9e5c-5f0d56c2153f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10205", "type": "seen", "source": "https://t.me/cvedetector/13060", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10205 - Hitachi Ops Center Analyzer Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10205 \nPublished : Dec. 17, 2024, 2:15 a.m. | 35\u00a0minutes ago \nDescription : Authentication Bypass  \nvulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics   \n  \ncomponent  \n  \n).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00. \nSeverity: 9.4 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T04:14:42.000000Z"}, {"uuid": "a3032032-d256-42dc-ab99-f87f35e0d153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10204", "type": "seen", "source": "https://t.me/cvedetector/11452", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10204 - SOLIDWORKS eDrawings Heap-based Buffer Overflow and Uninitialized Variable vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10204 \nPublished : Nov. 19, 2024, 2:15 p.m. | 37\u00a0minutes ago \nDescription : Heap-based Buffer Overflow and Uninitialized Variable vulnerabilities exist in the X_B and SAT file reading procedure in eDrawings from Release SOLIDWORKS 2024 through Release SOLIDWORKS 2025. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted X_B or SAT file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T15:58:26.000000Z"}, {"uuid": "6090fcad-a941-417a-8195-c89150d05eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10201", "type": "seen", "source": "https://t.me/cvedetector/8449", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10201 - Wellchoose Administrative Management System File Upload Vulnerability (Remote Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-10201 \nPublished : Oct. 21, 2024, 4:15 a.m. | 32\u00a0minutes ago \nDescription : Administrative Management System from Wellchoose does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload and execute webshells. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T06:48:12.000000Z"}, {"uuid": "f255fe5f-b02a-41db-9223-dff91c9de112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10202", "type": "seen", "source": "https://t.me/cvedetector/8448", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10202 - Wellchoose Administrative Management System OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10202 \nPublished : Oct. 21, 2024, 4:15 a.m. | 32\u00a0minutes ago \nDescription : Administrative Management System from Wellchoose has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T06:48:12.000000Z"}, {"uuid": "e6d18992-eb7a-46c4-825a-ba7f198f95f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1020", "type": "seen", "source": "https://t.me/ctinow/189580", "content": "https://ift.tt/xhAKp5J\nCVE-2024-1020 | Rebuild up to 3.5.5 /filex/proxy-download getStorageFile url cross site scripting", "creation_timestamp": "2024-02-21T13:36:46.000000Z"}, {"uuid": "53b9a2dd-6f82-4742-9d46-2b467a5d6607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1020", "type": "seen", "source": "https://t.me/ctinow/179668", "content": "https://ift.tt/RQXp1AC\nCVE-2024-1020 Exploit", "creation_timestamp": "2024-02-06T02:16:53.000000Z"}, {"uuid": "25357903-f03e-4883-9a32-440999610e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-10203", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113440949192253457", "content": "", "creation_timestamp": "2024-11-07T09:25:15.213859Z"}, {"uuid": "70dc0a32-87a3-4489-b9b4-b870d201e22f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10204", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1529/", "content": "", "creation_timestamp": "2024-11-19T06:00:00.000000Z"}, {"uuid": "a2c4e8ff-1da4-43ee-b2b6-3d18b31834e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10204", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1528/", "content": "", "creation_timestamp": "2024-11-19T06:00:00.000000Z"}, {"uuid": "50f643f4-f8b0-42d2-89e8-18eaef9137f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10204", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113509822280612003", "content": "", "creation_timestamp": "2024-11-19T13:20:35.797573Z"}]}