{"vulnerability": "cve-2024-5716", "sightings": [{"uuid": "3799f2b0-3cc8-4df0-9de9-585146a97211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528843647091961", "content": "", "creation_timestamp": "2024-11-22T21:57:58.602936Z"}, {"uuid": "1406bd56-c94f-4c03-9e90-8b3c6c97bd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfupraxfbz2g", "content": "", "creation_timestamp": "2025-01-16T16:39:02.734868Z"}, {"uuid": "1ecc2f2c-87dd-4612-9221-6f5f59286950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfuprb2nlt2q", "content": "", "creation_timestamp": "2025-01-16T16:39:03.319468Z"}, {"uuid": "fb9a5141-f9d9-40c3-96c8-616ab0747001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfuprb754x25", "content": "", "creation_timestamp": "2025-01-16T16:39:03.932539Z"}, {"uuid": "6522fe76-33ce-486c-bd7e-f3dc0f65078f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lfuqpq4wjm2s", "content": "", "creation_timestamp": "2025-01-16T16:56:04.201585Z"}, {"uuid": "16ecc99d-f2fb-4275-98c9-c5b393d31342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838924936818897", "content": "", "creation_timestamp": "2025-01-16T16:15:44.469050Z"}, {"uuid": "41b13791-3c4a-4d18-8875-e27c6a8ba1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838924965901071", "content": "", "creation_timestamp": "2025-01-16T16:15:44.691686Z"}, {"uuid": "dc6ffbb5-364e-4a8d-9c7f-41bce127b619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838924951270770", "content": "", "creation_timestamp": "2025-01-16T16:15:44.813367Z"}, {"uuid": "f1e783c2-9215-45c7-aa1a-2497579c7856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuohxsmx62t", "content": "", "creation_timestamp": "2025-01-16T16:15:56.472669Z"}, {"uuid": "674640eb-9e55-4dce-a383-742e8b88a0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuoi2chpy2c", "content": "", "creation_timestamp": "2025-01-16T16:15:59.172850Z"}, {"uuid": "120c345a-737d-451e-9642-c4ad525f3ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838939421308353", "content": "", "creation_timestamp": "2025-01-16T16:19:24.231976Z"}, {"uuid": "eac01b86-c035-4a2f-80cb-b7d3aab74b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuoi4p5q22s", "content": "", "creation_timestamp": "2025-01-16T16:16:01.663054Z"}, {"uuid": "6eadf07b-2278-4052-9758-4d509ef079e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838939406993522", "content": "", "creation_timestamp": "2025-01-16T16:19:23.925390Z"}, {"uuid": "e83c0a17-759d-48f9-96b5-74b376b30140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113838939436211918", "content": "", "creation_timestamp": "2025-01-16T16:19:24.450375Z"}, {"uuid": "1d561e29-8ce1-4adf-b77c-a0d95becc9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57160\n\ud83d\udd39 Description: 07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaTask/edit.html.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T16:07:45.376359\n\ud83d\udd17 References:\n1. https://github.com/1091101/yang.xian/tree/main/7/readme.md", "creation_timestamp": "2025-01-16T16:55:39.000000Z"}, {"uuid": "c9078afd-dadb-4537-a465-5a399ed286ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1976", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57161\n\ud83d\udd39 Description: 07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/edit.html\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T16:09:12.819539\n\ud83d\udd17 References:\n1. https://github.com/1091101/yang.xian/tree/main/8/readme.md", "creation_timestamp": "2025-01-16T16:55:34.000000Z"}, {"uuid": "e3dba54f-8e54-4136-a600-aa4b8ce04cbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1975", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57162\n\ud83d\udd39 Description: Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T16:12:57.644626\n\ud83d\udd17 References:\n1. https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md", "creation_timestamp": "2025-01-16T16:55:33.000000Z"}, {"uuid": "f34b5de3-ba64-457e-9d01-d5a02e32123c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8110", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57162\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php.\n\ud83d\udccf Published: 2025-01-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-19T17:58:06.270Z\n\ud83d\udd17 References:\n1. https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md", "creation_timestamp": "2025-03-19T18:19:27.000000Z"}, {"uuid": "5ea14c2c-5247-4c77-b618-5901e2910833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/160", "content": "\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Logsign Unified SecOps\n*\nCVE: CVE-2024-5716 to CVE-2024-5722 \u0438 CVE-2024-5716 CVE-2024-5717\n*\nRCE + ByPass  (+ \u0448\u0430\u0431\u043b\u043e\u043d\u044b nuclei)\n*\nPOC exploits", "creation_timestamp": "2024-08-13T07:31:57.000000Z"}, {"uuid": "a39fd135-d8fd-4910-bea8-aab503d70d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/700", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:26.000000Z"}, {"uuid": "eb96f40e-7729-40da-b632-9054a1ea0c30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57161", "type": "seen", "source": "https://t.me/cvedetector/15588", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57161 - 07FLYCMS CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57161 \nPublished : Jan. 16, 2025, 4:15 p.m. | 29\u00a0minutes ago \nDescription : 07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/edit.html \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T17:54:13.000000Z"}, {"uuid": "01a369c2-bb22-4dc1-8c95-60f1704bc875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57160", "type": "seen", "source": "https://t.me/cvedetector/15587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57160 - 07FLYCMS CSRFlash\", \n  \"Content\": \"CVE ID : CVE-2024-57160 \nPublished : Jan. 16, 2025, 4:15 p.m. | 29\u00a0minutes ago \nDescription : 07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaTask/edit.html. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T17:54:12.000000Z"}, {"uuid": "49f7e897-9261-425e-8ef3-f16b10927b51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57162", "type": "seen", "source": "https://t.me/cvedetector/15585", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57162 - Campcodes Cybercafe Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57162 \nPublished : Jan. 16, 2025, 4:15 p.m. | 29\u00a0minutes ago \nDescription : Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T17:54:11.000000Z"}, {"uuid": "ee3267a8-064d-4503-86b3-c56614a59ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3677", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:33.000000Z"}, {"uuid": "c476cd0b-1338-4385-92f6-41bf642a5000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2225", "content": "\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Logsign Unified SecOps\n*\nCVE: CVE-2024-5716 to CVE-2024-5722 \u0438 CVE-2024-5716 CVE-2024-5717\n*\nRCE + ByPass  (+ \u0448\u0430\u0431\u043b\u043e\u043d\u044b nuclei)\n*\nPOC exploits", "creation_timestamp": "2024-08-13T07:17:46.000000Z"}, {"uuid": "4baf5542-005b-49b1-82df-8f68845233f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/730", "content": "\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Logsign Unified SecOps\n*\nCVE: CVE-2024-5716 to CVE-2024-5722 \u0438 CVE-2024-5716 CVE-2024-5717\n*\nRCE + ByPass  (+ \u0448\u0430\u0431\u043b\u043e\u043d\u044b nuclei)\n*\nPOC exploits", "creation_timestamp": "2024-08-13T07:31:39.000000Z"}, {"uuid": "90dcec6b-8d43-44fd-a8fc-67f3ff40bbc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8179", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-5716 Nuclei Template\nURL\uff1ahttps://github.com/j4nk3/CVE-2024-5716\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-06T09:45:49.000000Z"}, {"uuid": "c3bd27ec-10c3-4cdf-951a-1a54aee0d175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "seen", "source": "https://t.me/GithubRedTeam/8181", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-5716 Nuclei Template\nURL\uff1ahttps://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-06T08:16:46.000000Z"}, {"uuid": "9851a771-293d-4cd0-95f6-bf5abf51b3a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57169", "type": "seen", "source": "https://t.me/cvedetector/20573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57169 - SOPlanning File Upload Bypass Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57169 \nPublished : March 18, 2025, 4:15 p.m. | 16\u00a0minutes ago \nDescription : A file upload bypass vulnerability exists in SOPlanning 1.53.00, specifically in /process/upload.php. This vulnerability allows remote attackers to bypass upload restrictions and potentially achieve remote code execution by uploading malicious files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:05.000000Z"}, {"uuid": "2c1d2aeb-01a7-4a38-84d7-2a9f08ac6220", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8622", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:44.000000Z"}, {"uuid": "f5ca98c0-7a9f-4ab0-9747-280007856807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5716", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7299", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:44.000000Z"}]}