{"vulnerability": "cve-2024-51568", "sightings": [{"uuid": "022cb7f8-cfcc-4eca-9e4a-2790d4843763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "https://t.me/cvedetector/9382", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51568 - CyberPanel Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51568 \nPublished : Oct. 29, 2024, 11:15 p.m. | 23\u00a0minutes ago \nDescription : CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T00:49:09.000000Z"}, {"uuid": "00a76f0d-9741-4f3a-8671-c8aca8b1dcd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "eeb93462-db1a-4537-9d8c-380c3823cc6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-51568.yaml", "content": "", "creation_timestamp": "2025-09-01T15:50:23.000000Z"}, {"uuid": "54fe1984-2b2e-46fb-8d1c-3ed55c7b2f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lxuzbcqop22o", "content": "", "creation_timestamp": "2025-09-02T21:02:35.509783Z"}, {"uuid": "e813f7a3-d53f-419b-a54a-3b30c37ee517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb", "content": "", "creation_timestamp": "2024-12-05T17:41:42.000000Z"}, {"uuid": "1c5fca86-e165-4a7a-b3dd-5696fc6e467b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly226rn5jd2v", "content": "", "creation_timestamp": "2025-09-04T21:02:29.572101Z"}, {"uuid": "2f67b466-2836-4d95-aaf4-c5690a490139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "8bb1180b-d75d-4420-a812-c5f1aa0fe187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51568", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}]}