{"vulnerability": "CVE-2024-28145", "sightings": [{"uuid": "604b3d27-2d7e-4363-a775-15c8a7fab6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28145", "type": "seen", "source": "https://t.me/cvedetector/12791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28145 - Apache HTTP Server SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-28145 \nPublished : Dec. 12, 2024, 2:15 p.m. | 44\u00a0minutes ago \nDescription : An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php\u00a0file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter \"field\" with the UNION keyword. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T16:20:49.000000Z"}, {"uuid": "9e9827c3-2ab5-4084-af16-ec9856db5cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28145", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113640145030708581", "content": "", "creation_timestamp": "2024-12-12T13:43:22.495117Z"}]}