{"vulnerability": "CVE-2024-1099", "sightings": [{"uuid": "57f4fb6e-2909-485b-98b9-1bb56b18f202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10997", "type": "seen", "source": "https://t.me/cvedetector/10183", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10997 - \"1000 Projects Bookstore Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10997 \nPublished : Nov. 8, 2024, 7:15 a.m. | 30\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /book_list.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T08:50:03.000000Z"}, {"uuid": "046ce763-e944-4a0c-b299-0d6f61d8da1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1099", "type": "seen", "source": "https://t.me/ctinow/190722", "content": "https://ift.tt/vkIaRmr\nCVE-2024-1099 | Rebuild up to 3.5.5 /filex/read-raw getFileOfData url cross site scripting", "creation_timestamp": "2024-02-22T13:42:21.000000Z"}, {"uuid": "2dcc60f4-a918-4baa-a02b-b0d01f6487cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1099", "type": "seen", "source": "https://t.me/ctinow/179577", "content": "https://ift.tt/D0gQ8e1\nCVE-2024-1099 Exploit", "creation_timestamp": "2024-02-05T23:16:09.000000Z"}, {"uuid": "4c1100a5-fa07-4e23-bf70-342f06513e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10990", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445492536568275", "content": "", "creation_timestamp": "2024-11-08T04:40:41.181049Z"}, {"uuid": "eea2f7c6-192d-4a3f-a2c0-63af188e5ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10991", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445581303190930", "content": "", "creation_timestamp": "2024-11-08T05:03:15.687579Z"}, {"uuid": "a07d027c-f132-47ed-912b-b92279e2de81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10996", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445953160510615", "content": "", "creation_timestamp": "2024-11-08T06:37:49.602754Z"}, {"uuid": "2b5d0507-4d81-4200-86fc-375db5fc88bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10995", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445953126374305", "content": "", "creation_timestamp": "2024-11-08T06:37:49.130774Z"}, {"uuid": "95c43c62-dd93-4680-94cd-ae4afab4f650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10998", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113446168416999779", "content": "", "creation_timestamp": "2024-11-08T07:32:34.303809Z"}, {"uuid": "a539a5cc-53f0-4ee3-908b-cde10451fd38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10999", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113446294868777752", "content": "", "creation_timestamp": "2024-11-08T08:04:43.836208Z"}, {"uuid": "0d50c712-4062-47bc-baa1-d77b091db55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10998", "type": "seen", "source": "https://t.me/cvedetector/10189", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10998 - \"1000 Projects Bookstore Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10998 \nPublished : Nov. 8, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/process_category_add.php. The manipulation of the argument cat leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T09:40:10.000000Z"}, {"uuid": "5e445b37-db37-46ab-aa52-9ff3cf7c604c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10999", "type": "seen", "source": "https://t.me/cvedetector/10188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10999 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10999 \nPublished : Nov. 8, 2024, 8:15 a.m. | 20\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /aboutadd.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T09:40:09.000000Z"}, {"uuid": "a40f9c63-3314-4810-8fe8-7cf08cff4f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10995", "type": "seen", "source": "https://t.me/cvedetector/10184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10995 - Codezips Hospital Appointment System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10995 \nPublished : Nov. 8, 2024, 7:15 a.m. | 30\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /removeDoctorResult.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T08:50:04.000000Z"}, {"uuid": "28d0e046-ce04-4a98-822e-edef4ba11831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10996", "type": "seen", "source": "https://t.me/cvedetector/10182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10996 - 1000 Projects Bookstore MySQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10996 \nPublished : Nov. 8, 2024, 7:15 a.m. | 30\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/process_category_edit.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T08:50:03.000000Z"}, {"uuid": "653ef381-a1ce-4290-acd8-9f37bbcc367a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10990", "type": "seen", "source": "https://t.me/cvedetector/10161", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10990 - SourceCodester Online Veterinary Appointment System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10990 \nPublished : Nov. 8, 2024, 5:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in SourceCodester Online Veterinary Appointment System 1.0. This vulnerability affects unknown code of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T07:09:27.000000Z"}, {"uuid": "ff6b7b90-6fcd-4515-8484-0bae71c8ac82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10991", "type": "seen", "source": "https://t.me/cvedetector/10158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10991 - Codezips Hospital Appointment System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10991 \nPublished : Nov. 8, 2024, 5:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T07:09:25.000000Z"}, {"uuid": "76d4a62c-dda7-4ac4-a84f-1939901959d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1099", "type": "seen", "source": "https://t.me/ctinow/176716", "content": "https://ift.tt/5FzI9eW\nCVE-2024-1099", "creation_timestamp": "2024-01-31T13:32:21.000000Z"}, {"uuid": "dedad5aa-157e-4c59-a75b-5d617ef0204c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-10998", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrwmdosxq2d", "content": "", "creation_timestamp": "2026-03-24T06:20:09.517681Z"}, {"uuid": "0ec34503-0cb1-4f7c-8dfb-33f86ddbd621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-10996", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrxq3dqhv2c", "content": "", "creation_timestamp": "2026-03-24T06:40:08.642327Z"}]}