{"vulnerability": "CVE-2024-51567", "sightings": [{"uuid": "841bf6eb-20c0-4fb1-88a4-c01da9541044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-12)", "content": "", "creation_timestamp": "2026-04-12T00:00:00.000000Z"}, {"uuid": "872624f4-822b-4b28-a0fe-264b923fd8ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "08b77d29-d175-4d42-9762-709edbc4d3c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8907", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-51567\nURL\uff1ahttps://github.com/ajayalf/CVE-2024-51567\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-05T09:01:04.000000Z"}, {"uuid": "0b982736-8652-4af7-8aa3-8affd486b183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3384", "content": "https://github.com/ajayalf/CVE-2024-51567\n\nCVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6\u2019s upgrademysqlstatus endpoint, bypassing CSRF protections.\n#github #exploit", "creation_timestamp": "2024-11-07T20:17:19.000000Z"}, {"uuid": "1ffdc0e8-1366-4c14-8d31-39701ec46566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "64226ba6-ee45-4ca6-a912-1fca35a8dec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "3e3255ae-1799-4ed4-acb1-2f36be019995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-24)", "content": "", "creation_timestamp": "2024-11-24T00:00:00.000000Z"}, {"uuid": "9f67fe64-4990-435b-9b4b-bd0f771762a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "76d312cc-a367-4bf6-8259-839e31c1f2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "13907ac2-e735-4a48-a4d1-2be326b47c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "cd94f895-ea3e-49d5-8cd4-7a3c2a02d83b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "b13b39aa-6d80-4171-b1ce-104ae99cb4f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "21b50766-7ad3-4147-8618-94f33dd6ee04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-28)", "content": "", "creation_timestamp": "2026-03-28T00:00:00.000000Z"}, {"uuid": "6b0893a2-5402-4d92-9518-7aa2c35c218e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9187", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6\u2019s upgrademysqlstatus endpoint, bypassing CSRF protections.\nURL\uff1ahttps://github.com/XiaomingX/cve-2024-51567-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-26T02:21:44.000000Z"}, {"uuid": "34ae792f-1806-4ad4-be1a-419b92e95a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/20838", "content": "https://github.com/XiaomingX/cve-2024-51567-poc\n\nCVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6\u2019s upgrademysqlstatus endpoint, bypassing CSRF protections.\n#github #poc", "creation_timestamp": "2024-11-27T14:40:14.000000Z"}, {"uuid": "f0156772-ef89-4367-925a-3672185eb509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "published-proof-of-concept", "source": "Telegram/J_GjA2WCl7uqMwB-sRu2kLgWEjOJgtbXC9QBosc4IPd4sg", "content": "", "creation_timestamp": "2024-11-02T16:28:40.000000Z"}, {"uuid": "14206a17-0527-48c4-bad4-0336f921c8a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "Telegram/v7aanU-4KqmN-XopwaqqXCitXZpeaor3gMoi3X4XFE0GBcsx", "content": "", "creation_timestamp": "2025-02-06T02:44:20.000000Z"}, {"uuid": "5d44a364-557e-46ad-84c6-647ead126e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-07T20:15:44.263037Z"}, {"uuid": "214c6baa-7d3b-4e70-84d3-fc7aebc1d7e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-11)", "content": "", "creation_timestamp": "2025-01-11T00:00:00.000000Z"}, {"uuid": "72bb0cc4-fc59-4dc2-a86b-6684c3318cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "b2b1d53d-36ca-419d-bc37-98964859a419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "4f071d58-f5da-4c35-a208-87edf1e52029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "1ad5947a-3761-4ba7-900e-4564eba161e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:01.000000Z"}, {"uuid": "7f9013e9-53df-404b-997b-83a49fb714e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/12a6bb02-2afb-4b99-b378-77d1d445e936", "content": "", "creation_timestamp": "2026-02-02T12:26:24.585407Z"}, {"uuid": "d9c1365e-c738-482d-8a4d-0c37c4390681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-04)", "content": "", "creation_timestamp": "2026-04-04T00:00:00.000000Z"}, {"uuid": "c0cd038c-74da-4941-ac4e-e0e26873c93a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "2fc47b4f-8171-4a68-a63c-e3ab6e1e6367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/12a6bb02-2afb-4b99-b378-77d1d445e936", "content": "", "creation_timestamp": "2026-02-02T12:26:24.585407Z"}, {"uuid": "4b06c8cf-9d10-40f6-98a3-7fbbb07e5b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-10)", "content": "", "creation_timestamp": "2026-04-10T00:00:00.000000Z"}, {"uuid": "2651441a-138d-428b-9548-d4e2faa72108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "https://t.me/cvedetector/9381", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51567 - CyberPanel upgrademysqlstatus Remote Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51567 \nPublished : Oct. 29, 2024, 11:15 p.m. | 23\u00a0minutes ago \nDescription : upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T00:49:08.000000Z"}, {"uuid": "3154291a-93be-4c22-84dd-06857bb14cfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113442403763317792", "content": "", "creation_timestamp": "2024-11-07T15:35:10.470241Z"}, {"uuid": "92fec4d7-bdae-4bec-bac6-82ab7c7edf67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/113442673510281546", "content": "", "creation_timestamp": "2024-11-07T16:43:47.491472Z"}, {"uuid": "9137e7bd-ce4e-496b-a15c-372f2fff7ec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2623047", "content": "", "creation_timestamp": "2024-11-07T18:26:15.214362Z"}, {"uuid": "fa7ed903-dbdd-4e4b-8568-08b800e77bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/b1e9758c-2010-458f-bb12-a83b9d77bcc6", "content": "", "creation_timestamp": "2024-11-13T11:07:10.000000Z"}, {"uuid": "1ceaf963-a0dc-4434-8761-db5fca799dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-11-07T18:10:03.000000Z"}, {"uuid": "569f4a26-2e57-440f-86be-1a3f59de5e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "9e08e7ac-730a-4635-87d3-c6d19e403a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-09)", "content": "", "creation_timestamp": "2024-11-09T00:00:00.000000Z"}, {"uuid": "cfa7adb7-1c7e-4f8d-82ea-a87ea6dce7b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-01)", "content": "", "creation_timestamp": "2024-12-01T00:00:00.000000Z"}, {"uuid": "2440c2f4-b585-471b-824d-2533ea7cb78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "dd1bfce9-2dc1-4aaa-b42a-1b1fff0676e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "8c444850-25c3-4db4-9831-91584957773e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.963936Z"}, {"uuid": "5726cd6b-f290-4962-b8f5-0f35f98c7dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb", "content": "", "creation_timestamp": "2024-12-05T17:41:42.000000Z"}, {"uuid": "1dfe63ef-876c-43a7-883d-b105dae979f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51567", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}]}