{"vulnerability": "CVE-2024-5743", "sightings": [{"uuid": "0661a459-d98b-44c4-956b-f7e9036c2050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57435", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:13.103\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md", "creation_timestamp": "2025-01-31T23:24:55.000000Z"}, {"uuid": "0533409a-d071-4f9d-8a2b-cf7603ea9351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3702", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57433\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.\n\ud83d\udccf Published: 2025-02-01T00:31:02Z\n\ud83d\udccf Modified: 2025-02-01T00:31:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-57433\n2. https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", "creation_timestamp": "2025-02-01T01:16:23.000000Z"}, {"uuid": "ac4a38b1-fd52-4e60-b42b-55fd3779482e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3692", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57433\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:12.383\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", "creation_timestamp": "2025-01-31T23:24:56.000000Z"}, {"uuid": "99338186-41d9-40d0-bf4f-9be59b477ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T22:15:12.613\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md", "creation_timestamp": "2025-01-31T23:24:56.000000Z"}, {"uuid": "aa42de12-445d-4dfd-b87d-927489ddcb51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "seen", "source": "https://t.me/cvedetector/16983", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57434 - Macrozheng Mall-Tiny Default Test User Super Admin Account Creation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57434 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control. The project imports users by default, and the test user is made a super administrator. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:36.000000Z"}, {"uuid": "795e4304-fa15-426d-9e8f-79d873c1ef40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "seen", "source": "https://t.me/cvedetector/16982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57433 - Macrozheng Mall-tiny Insecure Token Logout\", \n  \"Content\": \"CVE ID : CVE-2024-57433 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:35.000000Z"}, {"uuid": "12ab6b01-89d6-44e7-bd68-fbb3e65d72d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57435", "type": "seen", "source": "https://t.me/cvedetector/16981", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57435 - Macrozheng Mall-Tiny Denial-of-Service Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-57435 \nPublished : Jan. 31, 2025, 10:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : In macrozheng mall-tiny 1.0.1, an attacker can send null data through the resource creation interface resulting in a null pointer dereference occurring in all subsequent operations that require authentication, which triggers a denial-of-service attack and service restart failure. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T01:25:34.000000Z"}, {"uuid": "bf29a11f-4ea0-4656-a8da-c9eb0aab34dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57432", "type": "seen", "source": "https://t.me/cvedetector/16962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57432 - Macrozheng Mall-Tiny JWT Hardcoded Signing Key Privilege escalation\", \n  \"Content\": \"CVE ID : CVE-2024-57432 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : macrozheng mall-tiny 1.0.1 suffers from Insecure Permissions. The application's JWT signing keys are hardcoded and do not change. User information is explicitly written into the JWT and used for subsequent privilege management, making it is possible to forge the JWT of any user to achieve authentication bypass. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:21.000000Z"}, {"uuid": "ec22ad64-68b0-450f-b298-4c8ea0daebdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5743", "type": "seen", "source": "https://t.me/cvedetector/15164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5743 - EveHome Eve Play Preimage Attack Giving RCE\", \n  \"Content\": \"CVE ID : CVE-2024-5743 \nPublished : Jan. 13, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : An attacker could exploit the 'Use of Password Hash With Insufficient Computational Effort' vulnerability in EveHome Eve Play to execute arbitrary code.  \n  \nThis issue affects Eve Play: through 1.1.42. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T20:25:21.000000Z"}, {"uuid": "6698ff40-e2cc-4b75-8cb4-e26ce68745be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5743", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113822522594572407", "content": "", "creation_timestamp": "2025-01-13T18:44:25.346569Z"}, {"uuid": "ce4f092b-bf19-4a2f-a9f5-e1dc16a4da2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5743", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538936401433", "content": "", "creation_timestamp": "2025-01-13T18:48:37.376996Z"}, {"uuid": "d7816319-17f8-4047-b455-28033f0331d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5743", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822219355691353", "content": "", "creation_timestamp": "2025-01-13T17:27:16.669812Z"}, {"uuid": "b0f157dc-a947-45cc-ba30-37b82ed857e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113942391559330202", "content": "", "creation_timestamp": "2025-02-03T22:48:38.828325Z"}, {"uuid": "c5fdf497-aff8-4256-8479-37433b8cb428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957905371081090", "content": "", "creation_timestamp": "2025-02-06T16:34:00.631822Z"}, {"uuid": "45f06168-aedb-419f-86a2-a7fcb92a3100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57432", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2ispe4dc2h", "content": "", "creation_timestamp": "2025-01-31T17:15:44.240855Z"}, {"uuid": "5a54949e-3d0f-4bfa-8447-b7b06b41f3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57435", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqs57rw2i", "content": "", "creation_timestamp": "2025-02-01T01:35:48.736690Z"}, {"uuid": "fb716f84-7ac5-4105-86e9-9bed1cf73ecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://t.me/cvedetector/17411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57430 - PHPJabbers Cinema Booking System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57430 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : An SQL injection vulnerability in the pjActionGetUser function of PHPJabbers Cinema Booking System v2.0 allows attackers to manipulate database queries via the column parameter. Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:07.000000Z"}, {"uuid": "ee8bcb8e-850a-431e-ae90-ce66f3bf1e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3704", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control. The project imports users by default, and the test user is made a super administrator.\n\ud83d\udccf Published: 2025-02-01T00:31:02Z\n\ud83d\udccf Modified: 2025-02-01T00:31:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-57434\n2. https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md", "creation_timestamp": "2025-02-01T01:16:24.000000Z"}, {"uuid": "76317418-f3df-4ddf-b044-d3df759a37e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57435", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In macrozheng mall-tiny 1.0.1, an attacker can send null data through the resource creation interface resulting in a null pointer dereference occurring in all subsequent operations that require authentication, which triggers a denial-of-service attack and service restart failure.\n\ud83d\udccf Published: 2025-02-01T00:31:02Z\n\ud83d\udccf Modified: 2025-02-01T00:31:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-57435\n2. https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md", "creation_timestamp": "2025-02-01T01:16:24.000000Z"}, {"uuid": "f3e5c041-8faa-465e-8ec4-a02487cbf4e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7966", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57433\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T18:32:28.577Z\n\ud83d\udd17 References:\n1. https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", "creation_timestamp": "2025-03-18T19:03:03.000000Z"}, {"uuid": "e9f7bec7-acbf-4d44-a5b2-9aae256f42b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57439", "type": "seen", "source": "https://t.me/cvedetector/16688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57439 - Ruoyi DoS Password Reset Interface Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57439 \nPublished : Jan. 29, 2025, 3:15 p.m. | 50\u00a0minutes ago \nDescription : An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T17:21:32.000000Z"}, {"uuid": "8e4afc79-915b-4f2b-b559-4cb9131b9700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57438", "type": "seen", "source": "https://t.me/cvedetector/16687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57438 - RuoYi Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57438 \nPublished : Jan. 29, 2025, 3:15 p.m. | 50\u00a0minutes ago \nDescription : Insecure permissions in RuoYi v4.8.0 allows authenticated attackers to escalate privileges by assigning themselves higher level roles. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T17:21:31.000000Z"}, {"uuid": "0e4ab660-f77d-4780-aa50-f51da610b230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57437", "type": "seen", "source": "https://t.me/cvedetector/16686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57437 - RuoYi SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57437 \nPublished : Jan. 29, 2025, 3:15 p.m. | 50\u00a0minutes ago \nDescription : RuoYi v4.8.0 was discovered to contain a SQL injection vulnerability via the orderby parameter at /monitor/online/list. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T17:21:30.000000Z"}, {"uuid": "1f7150f5-2328-4c1a-9fce-c0b389e43547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57436", "type": "seen", "source": "https://t.me/cvedetector/16685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57436 - RuoYi Session ID Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57436 \nPublished : Jan. 29, 2025, 3:15 p.m. | 50\u00a0minutes ago \nDescription : RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-29T17:21:29.000000Z"}, {"uuid": "4f5bb0aa-e099-49bd-bbda-364bd8e38f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "published-proof-of-concept", "source": "Telegram/Zrldk8z1EwjpYU8Vg3CSH1QFx-z50lEQp2XdvPCkQk6RQ8I", "content": "", "creation_timestamp": "2025-02-04T16:00:09.000000Z"}, {"uuid": "69a0cc13-f9f8-4528-82af-dbfe7cd47bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsuy5572a", "content": "", "creation_timestamp": "2025-02-06T18:49:01.239012Z"}, {"uuid": "61287ed8-2e48-45de-8e07-416942182257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57438", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvb6bxlvy2e", "content": "", "creation_timestamp": "2025-01-29T15:15:44.367704Z"}, {"uuid": "028ed614-da29-48d5-b8d6-92a845922dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57439", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvb6e7dzp2i", "content": "", "creation_timestamp": "2025-01-29T15:15:46.643656Z"}, {"uuid": "4e7c3482-a18f-499e-92e3-dab9301bdae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjlnfgmhc24", "content": "", "creation_timestamp": "2025-02-06T17:16:23.421329Z"}, {"uuid": "929e36e7-82a2-4065-b04e-ea9f2a68d496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57438", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojteexv2q", "content": "", "creation_timestamp": "2025-01-29T19:14:52.685063Z"}, {"uuid": "e4ae7b38-c3e9-4483-9aa3-5cbea67553d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57437", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojsx3fq2y", "content": "", "creation_timestamp": "2025-01-29T19:14:50.332667Z"}, {"uuid": "a0621635-cb26-4e8d-a070-ef6e335a287c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57439", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojtaph72k", "content": "", "creation_timestamp": "2025-01-29T19:14:52.121240Z"}, {"uuid": "144dab93-64e4-40a7-85ff-476c8fa5faa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57436", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgvojto6e72w", "content": "", "creation_timestamp": "2025-01-29T19:14:54.543451Z"}, {"uuid": "4cc9eab9-7756-460d-9d5e-8d1539a138b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57432", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd75jz52g", "content": "", "creation_timestamp": "2025-01-31T21:35:32.138940Z"}, {"uuid": "25ba509c-3c3b-409a-aaaf-96c096cc063f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqsabzx2g", "content": "", "creation_timestamp": "2025-02-01T01:35:49.253623Z"}, {"uuid": "82c8216a-b0ca-483e-9a73-04db62ebb10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57439", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3386", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57439\n\ud83d\udd25 CVSS Score: 4.8 (CVSS_V3)\n\ud83d\udd39 Description: An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account.\n\ud83d\udccf Published: 2025-01-29T15:31:35Z\n\ud83d\udccf Modified: 2025-01-29T18:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-57439\n2. https://gitee.com/y_project/RuoYi\n3. https://github.com/peccc/restful_vul/blob/main/ruoyi_dos/ruoyi_dos.md\n4. https://github.com/yangzongzhuan/RuoYi\n5. https://ruoyi.vip", "creation_timestamp": "2025-01-29T19:11:22.000000Z"}, {"uuid": "8fb099b7-77bb-4960-998f-3bc1897f4b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57432", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941447094987736", "content": "", "creation_timestamp": "2025-02-03T18:48:42.066867Z"}, {"uuid": "c43ad156-efdd-48bf-85d9-54587449b2f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57436", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912080898338103", "content": "", "creation_timestamp": "2025-01-29T14:20:14.562660Z"}, {"uuid": "45718e6a-4aa6-4f26-9db4-ea0c7b0bba49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57437", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912080915386342", "content": "", "creation_timestamp": "2025-01-29T14:20:14.766954Z"}, {"uuid": "5f255cdc-e98e-401c-bfe7-40ea3ce0edc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57438", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912080930011368", "content": "", "creation_timestamp": "2025-01-29T14:20:15.107856Z"}, {"uuid": "2017ced8-6651-4145-8741-371d2f72df3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57439", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113912080944758221", "content": "", "creation_timestamp": "2025-01-29T14:20:15.450686Z"}, {"uuid": "0a273cec-0b4d-453b-a1ec-b0f33adb9f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57436", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvb65a5sx27", "content": "", "creation_timestamp": "2025-01-29T15:15:39.475236Z"}, {"uuid": "a7518e81-56e2-4077-b775-8d46e2b8cb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57437", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgvb67j2hl2p", "content": "", "creation_timestamp": "2025-01-29T15:15:41.884478Z"}, {"uuid": "59f811aa-9763-4f54-899d-02ec60636175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113959377139558293", "content": "", "creation_timestamp": "2025-02-06T22:48:18.394320Z"}, {"uuid": "351cdf81-f6e3-424f-adda-4bf537629d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhlsghkqdi2v", "content": "", "creation_timestamp": "2025-02-07T14:23:07.899469Z"}, {"uuid": "91ac1d9a-5762-4191-b8e9-26c992f655c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57434", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zl7iyv52h", "content": "", "creation_timestamp": "2025-01-31T22:15:46.605053Z"}, {"uuid": "ee065a19-a99d-4417-ba19-7b72a68301f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zl535rs2t", "content": "", "creation_timestamp": "2025-01-31T22:15:43.982568Z"}, {"uuid": "15ebe79d-4fef-4e05-8b7c-13168b606fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57435", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2zlbrefk2c", "content": "", "creation_timestamp": "2025-01-31T22:15:48.920778Z"}, {"uuid": "aeb12305-badc-4d90-9271-c6ba3ff70b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57433", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh3eqqyd3x25", "content": "", "creation_timestamp": "2025-02-01T01:35:43.699182Z"}]}