{"vulnerability": "CVE-2024-5742", "sightings": [{"uuid": "98119abe-41b5-4ee3-b063-b20fa33632f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57427", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsu46pz23", "content": "", "creation_timestamp": "2025-02-06T18:48:56.413180Z"}, {"uuid": "0deb558f-7645-4620-8fef-a2c3ef2fb2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsu7g4a23", "content": "", "creation_timestamp": "2025-02-06T18:48:57.003313Z"}, {"uuid": "5ca7ea92-f756-4e86-898f-77c9050589c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113959377087590387", "content": "", "creation_timestamp": "2025-02-06T22:48:17.502559Z"}, {"uuid": "51388a7c-4383-49a3-a84b-a001db359f4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57426", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6afmhkb26", "content": "", "creation_timestamp": "2025-02-06T22:49:09.933946Z"}, {"uuid": "7dbd31ac-8749-4b25-a041-fab2ceafd646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57426", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958635845317722", "content": "", "creation_timestamp": "2025-02-06T19:39:46.645829Z"}, {"uuid": "d3a33a9a-e110-4530-9fe7-dea5631ec72d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57423", "type": "seen", "source": "https://t.me/cvedetector/18964", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57423 - CloudClassroom-PHP Cross Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-57423 \nPublished : Feb. 26, 2025, 9:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : A Cross Site Scripting vulnerability in CloudClassroom-PHP Project v1.0 allows a remote attacker to execute arbitrary code via the exid parameter of the assessment function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T00:19:24.000000Z"}, {"uuid": "e10b293a-6222-4ff9-ad8c-5d5c446f048c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57427", "type": "published-proof-of-concept", "source": "Telegram/Zrldk8z1EwjpYU8Vg3CSH1QFx-z50lEQp2XdvPCkQk6RQ8I", "content": "", "creation_timestamp": "2025-02-04T16:00:09.000000Z"}, {"uuid": "e3e84c57-73c2-4e9b-8f7d-a3269fd3da5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57429", "type": "published-proof-of-concept", "source": "Telegram/Zrldk8z1EwjpYU8Vg3CSH1QFx-z50lEQp2XdvPCkQk6RQ8I", "content": "", "creation_timestamp": "2025-02-04T16:00:09.000000Z"}, {"uuid": "6343d70b-787b-4b39-8dec-71cb007791cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "published-proof-of-concept", "source": "Telegram/Zrldk8z1EwjpYU8Vg3CSH1QFx-z50lEQp2XdvPCkQk6RQ8I", "content": "", "creation_timestamp": "2025-02-04T16:00:09.000000Z"}, {"uuid": "ef39115b-f9f2-46b0-960a-fc5a61091e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57427", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjln6jahs2t", "content": "", "creation_timestamp": "2025-02-06T17:16:16.026667Z"}, {"uuid": "97643ae0-c5dd-4ddd-941b-6dc91e574539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjlnaxw2c2d", "content": "", "creation_timestamp": "2025-02-06T17:16:18.745866Z"}, {"uuid": "7970579b-1601-4a3c-aadb-09a60aa7c6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57429", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjlnd663s22", "content": "", "creation_timestamp": "2025-02-06T17:16:21.018402Z"}, {"uuid": "efa7b814-c02f-4415-a61f-60d1571a1ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhlsgh7es72f", "content": "", "creation_timestamp": "2025-02-07T14:23:06.920520Z"}, {"uuid": "4e620eed-aace-41fd-a12c-b70e848c3b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57426", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjvp32jkz2x", "content": "", "creation_timestamp": "2025-02-06T20:16:17.030544Z"}, {"uuid": "39dc4733-6742-47cf-a1c5-d4ef2c58924e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5742", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:40.608335Z"}, {"uuid": "38ac4032-b182-43bf-8757-c732c5b8588d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57426", "type": "seen", "source": "https://t.me/cvedetector/17425", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57426 - NetMod VPN Client DLL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57426 \nPublished : Feb. 6, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : NetMod VPN Client 5.3.1 is vulnerable to DLL injection, allowing an attacker to execute arbitrary code by placing a malicious DLL in a directory where the application loads dependencies. This vulnerability arises due to the improper validation of dynamically loaded libraries. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T21:55:30.000000Z"}, {"uuid": "e2da0085-9b80-4e71-8ab9-082854be0b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57426", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3951", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57426\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-06T20:15:39.923\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/iamsinghmanish/My-CVEs/tree/main/CVE-2024-57426\n2. https://sourceforge.net/projects/netmodhttp/", "creation_timestamp": "2025-02-11T23:12:03.000000Z"}, {"uuid": "28c45530-bd18-48b2-8782-a948523d93ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57427", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957861619119242", "content": "", "creation_timestamp": "2025-02-06T16:22:52.976403Z"}, {"uuid": "49b7381f-44dc-4877-94cd-56f63056caa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957861655010492", "content": "", "creation_timestamp": "2025-02-06T16:22:53.369973Z"}, {"uuid": "158de0c1-8aaa-4cac-83f8-596f5d758856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57429", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957905337272847", "content": "", "creation_timestamp": "2025-02-06T16:33:59.879727Z"}, {"uuid": "283cd4ab-3f2a-4c4f-b3ad-4ce3c6f24b14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57429", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsv3gpz23", "content": "", "creation_timestamp": "2025-02-06T18:49:01.838940Z"}, {"uuid": "7614ecd7-a9d7-4c9e-86c9-520df7de9002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57427", "type": "seen", "source": "https://t.me/cvedetector/17412", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57427 - PHPJabbers Cinema Booking System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57427 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : PHPJabbers Cinema Booking System v2.0 is vulnerable to reflected cross-site scripting (XSS). Multiple endpoints improperly handle user input, allowing malicious scripts to execute in a victim\u2019s browser. Attackers can craft malicious links to steal session cookies or conduct phishing attacks. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:11.000000Z"}, {"uuid": "fb85a0a1-8059-4f8e-9ded-0c23c323db15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57429", "type": "seen", "source": "https://t.me/cvedetector/17410", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57429 - PHPJabbers Cinema Booking System CSRF Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-57429 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A cross-site request forgery (CSRF) vulnerability in the pjActionUpdate function of PHPJabbers Cinema Booking System v2.0 allows remote attackers to escalate privileges by tricking an authenticated admin into submitting an unauthorized request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:06.000000Z"}, {"uuid": "b678356c-022b-423c-9c84-317cf21c372b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57428", "type": "seen", "source": "https://t.me/cvedetector/17409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57428 - \"PHPJabbers Cinema Booking System Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-57428 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability in PHPJabbers Cinema Booking System v2.0 exists due to unsanitized input in file upload fields (event_img, seat_maps) and seat number configurations (number[new_X] in pjActionCreate). Attackers can inject persistent JavaScript, leading to phishing, malware injection, and session hijacking. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:05.000000Z"}]}