{"vulnerability": "cve-2024-5137", "sightings": [{"uuid": "8a3009ee-620c-47da-90dc-52e141626ce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51377", "type": "seen", "source": "https://t.me/cvedetector/9603", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51377 - Ladybird Web Solution Faveo Helpdesk &amp; Servicedesk Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51377 \nPublished : Nov. 1, 2024, 4:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in Ladybird Web Solution Faveo Helpdesk &amp; Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T17:51:35.000000Z"}, {"uuid": "5adaae3d-7f98-434c-aaf0-d015c03da078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://t.me/cvedetector/9380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51378 - CyberPanel FTP Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51378 \nPublished : Oct. 29, 2024, 11:15 p.m. | 23\u00a0minutes ago \nDescription : getresetstatus in dns/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T00:49:07.000000Z"}, {"uuid": "eeee018f-9897-4e26-be6b-ef8b9118b0a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51379", "type": "seen", "source": "https://t.me/cvedetector/9937", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51379 - JATOSStored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51379 \nPublished : Nov. 5, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : Stored Cross-Site Scripting (XSS) vulnerability discovered in JATOS v3.9.3. The vulnerability exists in the description component of the study section, where an attacker can inject JavaScript into the description field. This allows for the execution of malicious scripts when an admin views the description, potentially leading to account takeover and unauthorized actions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T21:25:36.000000Z"}, {"uuid": "a9db5a35-2d4d-4705-8a21-6a4be1877060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6249", "content": "\ud83d\udea8PoC for CVE-2024-51378; CyberPanel Command Injection Vulnerability\n\nhttps://darkwebinformer.com/poc-for-cve-2024-51378-cyberpanel-command-injection-vulnerability/", "creation_timestamp": "2024-11-01T15:52:35.000000Z"}, {"uuid": "b33c7d5d-0f09-4161-ac8a-0cf751683dea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51376", "type": "seen", "source": "Telegram/iySMwiABlZTPRD5jYXmqcZlaHnwhVGiVMMgl2NhgkY5uuQqp", "content": "", "creation_timestamp": "2025-02-14T10:06:08.000000Z"}, {"uuid": "0297b426-c38a-4c27-8b54-7f886f0be1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "Telegram/hAHua5d1pVQC4hevr5d9AFlXU4JaWCrjE_B310OODrBehQ", "content": "", "creation_timestamp": "2024-12-05T08:30:48.000000Z"}, {"uuid": "cd4d4a88-c0ec-4767-8766-67dc6a9ad360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/159781", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:17:10.000000Z"}, {"uuid": "48bf2d6e-15b9-4667-85e6-01f04096d41a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "Telegram/NlX5iIOkjAyu_cnVBsoaTsLGKP0OmWGGQtJGzMbvFGfWaLno", "content": "", "creation_timestamp": "2024-12-08T16:38:58.000000Z"}, {"uuid": "ee90db37-f031-4182-8a17-52ac6413f4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/softrinx/708", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:17:10.000000Z"}, {"uuid": "b745c5f8-94f4-4490-9129-5309e83b97b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2408", "content": "CVE-2024-51378 CyberPanel Command Injection\n*\nWriteUp\n*\nexploit", "creation_timestamp": "2024-12-05T10:07:16.000000Z"}, {"uuid": "29a5ab59-8d93-47f6-9ce7-35e1a9eed69d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html", "content": "", "creation_timestamp": "2024-12-05T04:09:00.000000Z"}, {"uuid": "7eddc872-9dc1-4a0f-b0fa-e8c951b1778d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2823029", "content": "", "creation_timestamp": "2024-12-04T17:40:15.011772Z"}, {"uuid": "43c73204-f297-4273-b76c-0e929fdc1a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-12-12T15:10:03.000000Z"}, {"uuid": "9f9ba8d3-b414-45fd-a949-3f2534b445b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmngl3o2pb2t", "content": "", "creation_timestamp": "2025-04-12T21:02:21.893881Z"}, {"uuid": "99c32963-4180-42bc-aaa9-7dfe31c49109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.864138Z"}, {"uuid": "55b144ce-4014-4d6b-9c3c-6fc28f4ba5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb", "content": "", "creation_timestamp": "2024-12-05T17:41:42.000000Z"}, {"uuid": "2df421d0-12d1-40b4-9b06-26ea53d5c56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9705", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA Python script to scan websites for the CVE-2024-51378 vulnerability.\nURL\uff1ahttps://github.com/i0x29A/CVE-2024-51378\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2025-01-03T08:10:10.000000Z"}, {"uuid": "70c101de-61b3-4a23-965e-da7a1125a685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/codeby_sec/8595", "content": "\u0412 \u0447\u0435\u043c \u043e\u0442\u043b\u0438\u0447\u0438\u0435 CVE \u0438 CWE\n\n\u25b6\ufe0fCVE (Common Vulnerabilities and Exposures) \u2013 \u044d\u0442\u043e \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\n\u041f\u0440\u0438\u043c\u0435\u0440: CVE-2024-51378 - \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0421yberPanel, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u25b6\ufe0fCWE (Common Weakness Enumeration) \u2013 \u043e\u0431\u0449\u0438\u0439 \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 (\u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432) \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\u041f\u0440\u0438\u043c\u0435\u0440: CWE-89 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a\u043e \u0432\u0441\u0435\u043c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f\u043c \u2014 \u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0442\u0438\u0432\u043d\u043e\u043c\u0443 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0443, \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u043c\u0443 \u043f\u0443\u0442\u044c \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\ud83d\udca0 \u041a\u043b\u044e\u0447\u0435\u0432\u043e\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u0438\u0435\n\u0413\u043b\u0430\u0432\u043d\u043e\u0435 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043c\u0435\u0436\u0434\u0443 CVE \u0438 CWE \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0438\u0445 \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0438. \n\ud83d\udca0 CVE \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u0444\u0430\u043a\u0442 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u042d\u0442\u043e \u0437\u0430\u043f\u0438\u0441\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\ud83d\udca0 CWE \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u0438\u0447\u0438\u043d\u0443 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u044e \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0447\u0430\u0441\u0442\u043e \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0430\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\ud83d\udca0 \u041f\u0440\u0438\u043c\u0435\u0440 \u0432\u0437\u0430\u0438\u043c\u043e\u0441\u0432\u044f\u0437\u0438 CVE \u0438 CWE\n\u0412\u043e\u0437\u044c\u043c\u0451\u043c CVE-2024-51378, \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0439 \u0440\u0430\u043d\u0435\u0435. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 CyberPanel \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u043c\u0438 CWE, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440:\n\ud83d\udca0 CWE-287 (\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f) \u2014 \u043e\u0441\u043d\u043e\u0432\u043d\u0430\u044f \u043f\u0440\u0438\u0447\u0438\u043d\u0430, \u043f\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438.\n\ud83d\udca0 CWE-78 (\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0430\u044f \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434\u0430\u0445) \u2014 \u043f\u0440\u0438\u0447\u0438\u043d\u0430, \u043f\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.", "creation_timestamp": "2024-12-19T07:22:35.000000Z"}, {"uuid": "4c13266d-6227-479b-b428-4a0a1251132d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113595364674270813", "content": "", "creation_timestamp": "2024-12-04T15:55:08.719236Z"}, {"uuid": "d1b5ff31-eec6-41d5-ac76-55fbe4e97071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113597361615148511", "content": "", "creation_timestamp": "2024-12-05T00:22:59.284498Z"}, {"uuid": "d5d59b66-8285-4586-b5bb-cca667945935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "485af23a-9516-4a93-b71d-d7e0f2ea8184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:02.000000Z"}, {"uuid": "7dd25977-3334-4360-9a42-7b969ef56300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f8280b1b-b59e-4819-a170-9b84531385c1", "content": "", "creation_timestamp": "2026-02-02T12:26:19.181734Z"}, {"uuid": "e2d2cef4-1f9a-48b2-9b90-0f813461692f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8886", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit for CyberPanel RCE via Command Injection\nURL\uff1ahttps://github.com/refr4g/CVE-2024-51378\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-10-30T02:57:23.000000Z"}, {"uuid": "f30c69a9-b9cb-49b7-b9f1-95d62c75f558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51379", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/439", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55008\n\ud83d\udd39 Description: JATOS 3.9.4 contains a denial-of-service (DoS) vulnerability in the authentication system, where an attacker can prevent legitimate users from accessing their accounts by repeatedly sending multiple failed login attempts. Specifically, by submitting 3 incorrect login attempts every minute, the attacker can trigger the account lockout mechanism on the account level, effectively locking the user out indefinitely. Since the lockout is applied to the user account and not based on the IP address, any attacker can trigger the lockout on any user account, regardless of their privileges.\n\ud83d\udccf Published: 2025-01-07T00:00:00\n\ud83d\udccf Modified: 2025-01-07T15:11:30.416773\n\ud83d\udd17 References:\n1. http://jatos.com\n2. https://hacking-notes.medium.com/cve-2024-51379-jatos-v3-9-4-account-lockout-denial-of-service-cc970f4ca58f", "creation_timestamp": "2025-01-07T15:38:40.000000Z"}, {"uuid": "12e8857c-bbf2-43f1-8853-58d262b48e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51376", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51376\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Directory Traversal vulnerability in yeqifu carRental v.1.0 allows a remote attacker to obtain sensitive information via the file/downloadFile.action?path= component.\n\ud83d\udccf Published: 2025-02-13T00:33:07Z\n\ud83d\udccf Modified: 2025-02-13T00:33:07Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-51376\n2. https://github.com/yeqifu/carRental/issues/43\n3. https://github.com/echo0d/vulnerability/blob/main/yeqifu_carRental/DirectoryTraversal.md", "creation_timestamp": "2025-02-13T01:08:45.000000Z"}, {"uuid": "73b5bc12-d9cf-4743-a558-31be4e852a21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51376", "type": "seen", "source": "https://t.me/cvedetector/17955", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51376 - Yeqifu CarRental Directory Traversal Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-51376 \nPublished : Feb. 12, 2025, 11:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : Directory Traversal vulnerability in yeqifu carRental v.1.0 allows a remote attacker to obtain sensitive information via the file/downloadFile.action?path= component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T02:56:44.000000Z"}, {"uuid": "55488298-8d31-48c3-bb09-1df02c12fe8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "https://t.me/breachdetector/785917", "content": "{\n  \"Source\": \"Darkforums[.]st\",\n  \"Content\": \"[CVE-2024-51378] CyberPanel Pre-Auth RCE via Command Injection\", \n  \"author\": \"cache\",\n  \"Detection Date\": \"13 Jun 2025\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2025-06-13T22:47:21.000000Z"}, {"uuid": "a225c9f0-4b32-4f93-92f6-5a92232f657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "ea9be545-f293-4d7c-aa78-1e9e4dd72331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51376", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhzcj62qqz2a", "content": "", "creation_timestamp": "2025-02-12T23:15:33.633833Z"}, {"uuid": "23f0c9f9-b8b2-4273-ad1b-6b40aab33f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51376", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhzn42bh7h2y", "content": "", "creation_timestamp": "2025-02-13T02:25:09.741180Z"}, {"uuid": "fbefd3f2-680c-4d5c-b73a-84473bc6ce85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "587573ec-dbf4-415d-b1f2-0f96062c8edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f8280b1b-b59e-4819-a170-9b84531385c1", "content": "", "creation_timestamp": "2026-02-02T12:26:19.181734Z"}, {"uuid": "64ec9368-8440-4b8c-bb36-eeefffc0d6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51378", "type": "published-proof-of-concept", "source": "Telegram/sh_Wj4yVZfYZ8SMMOaybmV9yApMn3mNDIaTU298AM_pVdB8", "content": "", "creation_timestamp": "2025-11-11T21:00:05.000000Z"}]}