{"vulnerability": "cve-2024-5551", "sightings": [{"uuid": "75589a0e-3228-4d9a-801c-aaa95205e5b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55513", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113669958969464068", "content": "", "creation_timestamp": "2024-12-17T20:05:29.618794Z"}, {"uuid": "01fe29f1-b531-4d6c-9c1f-4770eb82f5d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55516", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113669959037867060", "content": "", "creation_timestamp": "2024-12-17T20:05:29.677168Z"}, {"uuid": "5b6a3d71-33e7-4bdf-9676-601dfa43afff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55514", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113669958986796181", "content": "", "creation_timestamp": "2024-12-17T20:05:29.723150Z"}, {"uuid": "cbb63226-1bed-4106-b508-07ca372cb041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55515", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113669959001814856", "content": "", "creation_timestamp": "2024-12-17T20:05:29.766896Z"}, {"uuid": "fcabf375-6e0e-4f0f-96c7-8b09c42765ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793531655881968", "content": "", "creation_timestamp": "2025-01-08T15:51:36.720186Z"}, {"uuid": "7ebc0991-b782-4e70-b0e9-4b570fadd260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113794698541811799", "content": "", "creation_timestamp": "2025-01-08T20:48:22.466656Z"}, {"uuid": "69394948-3a67-4b2c-acae-4df46cf803a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfveqk23ld2y", "content": "", "creation_timestamp": "2025-01-16T22:54:27.532540Z"}, {"uuid": "12531705-2ca5-410b-be09-8d1553c20e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfvclsfajo2n", "content": "", "creation_timestamp": "2025-01-16T22:15:59.777744Z"}, {"uuid": "7c7022e2-548c-4465-9ee4-8d1a78af1810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3334", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55511\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A null pointer dereference vulnerability in Macrium Reflect prior to 8.1.8017 allows an attacker to elevate their privileges via executing a specially crafted executable.\n\ud83d\udccf Published: 2025-01-17T00:30:48Z\n\ud83d\udccf Modified: 2025-01-29T00:31:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55511\n2. https://github.com/nikosecurity/CVE-2024-55511\n3. https://updates.macrium.com/reflect/v8/v8.1.8017/details8.1.8017.htm", "creation_timestamp": "2025-01-29T01:10:20.000000Z"}, {"uuid": "75990e64-7c45-4d13-876f-3efd1e4e69f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "seen", "source": "https://t.me/cvedetector/15656", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55511 - Macrium Reflect Null Pointer Dereference Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55511 \nPublished : Jan. 16, 2025, 10:15 p.m. | 28\u00a0minutes ago \nDescription : A null pointer dereference vulnerability in Macrium Reflect prior to 8.1.8017 allows an attacker to elevate their privileges via executing a specially crafted executable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T23:46:30.000000Z"}, {"uuid": "ce56e34c-6d16-47e6-8bda-69850adef7a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "published-proof-of-concept", "source": "Telegram/EBxlpoDEVgCTaQenJ-7Tl1HpGayD89g3xFJ6axCCTzov1N4", "content": "", "creation_timestamp": "2025-01-22T16:00:13.000000Z"}, {"uuid": "ddd5ca0f-7629-4d23-bdcf-8b13dd09273d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55511", "type": "published-proof-of-concept", "source": "Telegram/QbKsrVZo62SnFgMaF2CMO5HKDx0dEQUP8BMaXCucwzSM5V8", "content": "", "creation_timestamp": "2025-01-20T22:00:06.000000Z"}, {"uuid": "1d9de2f4-0c92-429d-b040-7c63da3ad121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakqrbhjq2x", "content": "", "creation_timestamp": "2025-01-08T16:16:01.740231Z"}, {"uuid": "a713b84c-c589-4545-a819-8cc5b771ecbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb3wpyy2r", "content": "", "creation_timestamp": "2025-01-08T16:43:03.655050Z"}, {"uuid": "4bc6a514-9cbc-4380-97af-be3c7ad942f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/722", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55517\n\ud83d\udd39 Description: An issue was discovered in the Interllect Core Search in Polaris FT Intellect Core Banking 9.5. Input passed through the groupType parameter in /SCGController is mishandled before being used in SQL queries, allowing SQL injection in an authenticated session.\n\ud83d\udccf Published: 2025-01-08T00:00:00\n\ud83d\udccf Modified: 2025-01-08T15:50:59.168594\n\ud83d\udd17 References:\n1. https://hackmd.io/@AowPhwc/SyvEiDsIye", "creation_timestamp": "2025-01-08T16:19:10.000000Z"}, {"uuid": "7a8264f8-e4ac-415c-b2c5-cde66ab1a65a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55517", "type": "seen", "source": "https://t.me/cvedetector/14692", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55517 - Polaris FT Intellect Core Banking SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-55517 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An issue was discovered in the Interllect Core Search in Polaris FT Intellect Core Banking 9.5. Input passed through the groupType parameter in /SCGController is mishandled before being used in SQL queries, allowing SQL injection in an authenticated session. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:13.000000Z"}, {"uuid": "ed546247-af43-4749-9c2b-b1723a7063c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55514", "type": "seen", "source": "https://t.me/cvedetector/13129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55514 - Raisecom MSG series File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55514 \nPublished : Dec. 17, 2024, 8:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_sfmig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T21:48:11.000000Z"}, {"uuid": "b0ca5034-a0a1-4c81-b9bc-43c324492588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55513", "type": "seen", "source": "https://t.me/cvedetector/13128", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55513 - Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55513 \nPublished : Dec. 17, 2024, 8:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_netaction.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T21:48:10.000000Z"}, {"uuid": "ce09bef4-4b49-410f-85f3-b4b3b7d0fdba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55515", "type": "seen", "source": "https://t.me/cvedetector/13126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55515 - Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55515 \nPublished : Dec. 17, 2024, 8:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_ipslib.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T21:48:09.000000Z"}, {"uuid": "74be1b79-6473-4b12-9844-8c2313541ddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55516", "type": "seen", "source": "https://t.me/cvedetector/13125", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55516 - Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55516 \nPublished : Dec. 17, 2024, 8:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T21:48:08.000000Z"}]}