{"vulnerability": "CVE-2024-5688", "sightings": [{"uuid": "23e3b3eb-7bfa-411b-a045-5d875e52e07f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56889", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113959092603822996", "content": "", "creation_timestamp": "2025-02-06T21:35:56.357577Z"}, {"uuid": "8f8a9c1d-ddf6-4746-a078-1da7a308bc3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56889", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhk4gn43ws2u", "content": "", "creation_timestamp": "2025-02-06T22:16:50.111064Z"}, {"uuid": "a651b8a6-5ddb-405a-80a6-06512a12ad16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114031809855887969", "content": "", "creation_timestamp": "2025-02-19T17:49:02.042908Z"}, {"uuid": "c2d52f5d-7152-47e3-9b7d-9661a94fd9e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://t.me/cvedetector/18352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56882 - Sage DPW Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56882 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:50.000000Z"}, {"uuid": "d49e6d89-81e3-41cc-af76-c930c86e431c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://t.me/cvedetector/18350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56883 - Sage DPW Role-Based Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56883 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:49.000000Z"}, {"uuid": "57a944f0-b1e5-49a9-ab98-591a1da6aeb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T14:44:40.063Z\n\ud83d\udd17 References:\n1. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-03-18T14:49:55.000000Z"}, {"uuid": "ad254f06-8043-4424-adc6-9e89a6aacc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56889", "type": "seen", "source": "https://t.me/cvedetector/17437", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56889 - CodeAstro Complaint Management System Unrestricted File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56889 \nPublished : Feb. 6, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:02.000000Z"}, {"uuid": "ac130bf2-1092-4f3f-b7b5-5b8efae284cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulgftef27", "content": "", "creation_timestamp": "2025-02-18T18:16:13.083267Z"}, {"uuid": "f812f4e4-8604-4efb-874a-89f25268a61f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulijfvf2n", "content": "", "creation_timestamp": "2025-02-18T18:16:15.693825Z"}, {"uuid": "3848351c-f91d-41cd-8ddf-eb2ac7be5bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiauw4ind22", "content": "", "creation_timestamp": "2025-02-18T21:56:16.660064Z"}, {"uuid": "5b12b5d9-c666-4752-92cf-ecf9ff32028c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiaux2qjt2y", "content": "", "creation_timestamp": "2025-02-18T21:56:21.207206Z"}, {"uuid": "8cd62f61-ce2c-494e-a931-e23e8c50db05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-07T03:32:02Z\n\ud83d\udccf Modified: 2025-02-07T18:31:20Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-56889\n2. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-02-07T19:04:23.000000Z"}]}