{"vulnerability": "CVE-2024-1303", "sightings": [{"uuid": "ab39a6f2-7a11-4537-a67d-a914ec093534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113736183009466505", "content": "", "creation_timestamp": "2024-12-29T12:47:06.613124Z"}, {"uuid": "e80aa10a-4e54-40b7-a09c-a5133d0fb95a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738954495833597", "content": "", "creation_timestamp": "2024-12-30T00:31:55.641487Z"}, {"uuid": "b14998d6-6170-4bd9-8299-0dac8e4fa336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13031", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739043756073271", "content": "", "creation_timestamp": "2024-12-30T00:54:37.489046Z"}, {"uuid": "cd8517d6-1f84-438c-a109-a25bb9433198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13032", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739170986547140", "content": "", "creation_timestamp": "2024-12-30T01:26:58.800044Z"}, {"uuid": "37486886-dfad-443d-bacc-eef82a47fa10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13035", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739433881412303", "content": "", "creation_timestamp": "2024-12-30T02:33:50.149938Z"}, {"uuid": "61500e0e-1d77-4f18-8202-3c5076c9df8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739565665097148", "content": "", "creation_timestamp": "2024-12-30T03:07:21.167003Z"}, {"uuid": "8c483a63-73cc-44f4-87c2-c709e5437914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13037", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739697607084761", "content": "", "creation_timestamp": "2024-12-30T03:40:54.670851Z"}, {"uuid": "56e3edec-fe14-45bf-bb45-9e24d68b7c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13038", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739816718367054", "content": "", "creation_timestamp": "2024-12-30T04:11:11.836885Z"}, {"uuid": "57d8d5fe-40d0-40d1-abb2-4312c8328b33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13039", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113739902063679070", "content": "", "creation_timestamp": "2024-12-30T04:32:54.112851Z"}, {"uuid": "dc9cad64-7fa0-4276-9824-ddb9ac842d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mhlwkal3ka2m", "content": "", "creation_timestamp": "2026-03-21T21:03:02.926955Z"}, {"uuid": "7b3bb7e6-7a81-448a-8fac-c680554ca20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13039", "type": "seen", "source": "https://t.me/cvedetector/13919", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13039 - \"Code-Projects Simple Chat System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-13039 \nPublished : Dec. 30, 2024, 5:15 a.m. | 23\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Simple Chat System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /add_user.php. The manipulation of the argument name/email/password/number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T06:46:05.000000Z"}, {"uuid": "43c1f64e-421a-4788-9d82-c7c7cfe77dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13037", "type": "seen", "source": "https://t.me/cvedetector/13918", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13037 - \"1000 Projects Attendance Tracking Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13037 \nPublished : Dec. 30, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T05:55:55.000000Z"}, {"uuid": "619f3230-56ee-4883-bf66-3b0f770ef08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://t.me/cvedetector/13910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13030 - \"D-Link DIR-823G Web Management Remote Access Control Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13030 \nPublished : Dec. 30, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T03:25:19.000000Z"}, {"uuid": "1df3ab64-9718-4ff2-86f4-6c5cac35fca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1303", "type": "seen", "source": "https://t.me/ctinow/205893", "content": "https://ift.tt/rTNGyo4\nCVE-2024-1303", "creation_timestamp": "2024-03-12T17:32:01.000000Z"}, {"uuid": "f0bda08a-1cad-4e20-8101-870757d45b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13030", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e778c2d-cf27-4c9c-9fe6-fc01102b5431", "content": "", "creation_timestamp": "2026-03-12T10:50:26.115478Z"}, {"uuid": "2a5b3321-51e2-44b3-beff-a9ab769f0694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13030", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e778c2d-cf27-4c9c-9fe6-fc01102b5431", "content": "", "creation_timestamp": "2026-03-12T10:50:26.115478Z"}, {"uuid": "1eb5c9c7-085f-4905-89e1-7acdb3c6fdaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13038", "type": "seen", "source": "https://t.me/cvedetector/13917", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13038 - CodeAstro Simple Loan Management System SQL Injection Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-13038 \nPublished : Dec. 30, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A vulnerability was found in CodeAstro Simple Loan Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T05:55:55.000000Z"}, {"uuid": "8cb0b6bc-277e-44f4-9275-1fd5053cefea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13035", "type": "seen", "source": "https://t.me/cvedetector/13916", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13035 - Code-Projects Chat System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13035 \nPublished : Dec. 30, 2024, 3:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/update_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T05:05:45.000000Z"}, {"uuid": "3e90f6ae-572c-405e-99c6-5400564398e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13036", "type": "seen", "source": "https://t.me/cvedetector/13915", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13036 - Code-projects Chat System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13036 \nPublished : Dec. 30, 2024, 3:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/update_room.php. The manipulation of the argument id/name/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T05:05:44.000000Z"}, {"uuid": "f525a847-0932-4a00-be04-7b9c678d48bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13034", "type": "seen", "source": "https://t.me/cvedetector/13913", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13034 - Code-projects Chat System Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13034 \nPublished : Dec. 30, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in code-projects Chat System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T04:15:26.000000Z"}, {"uuid": "667bc4ab-b16b-4132-9ac7-211b0bd87911", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13032", "type": "seen", "source": "https://t.me/cvedetector/13914", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13032 - Antabot White-Jotter Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-13032 \nPublished : Dec. 30, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Antabot White-Jotter up to 0.2.2. Affected by this vulnerability is an unknown functionality of the file /admin/content/editor of the component Article Editor. The manipulation of the argument articleCover leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T04:15:26.000000Z"}, {"uuid": "e0611068-d84b-4f53-a38f-d537446128d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13033", "type": "seen", "source": "https://t.me/cvedetector/13912", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13033 - Code-projects Chat System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13033 \nPublished : Dec. 30, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in code-projects Chat System 1.0. Affected by this issue is some unknown functionality of the file /admin/chatroom.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T04:15:25.000000Z"}, {"uuid": "b735e831-80bd-4b7a-a5f3-cad4747c4922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13031", "type": "seen", "source": "https://t.me/cvedetector/13911", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13031 - Antabot White-Jotter Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13031 \nPublished : Dec. 30, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in Antabot White-Jotter up to 0.2.2. Affected is an unknown function of the file /admin/content/editor of the component Article Content Editor. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T03:25:20.000000Z"}, {"uuid": "4efe7c33-f347-4037-8746-371cc40861e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1303", "type": "seen", "source": "https://t.me/ctinow/205901", "content": "https://ift.tt/rTNGyo4\nCVE-2024-1303", "creation_timestamp": "2024-03-12T17:32:10.000000Z"}]}