{"vulnerability": "cve-2024-5766", "sightings": [{"uuid": "70f4efa6-2f5d-49f0-8148-d9867306de5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57668", "type": "seen", "source": "https://t.me/cvedetector/17431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57668 - Apache Code-projects Shopping Portal File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57668 \nPublished : Feb. 6, 2025, 7:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T21:55:38.000000Z"}, {"uuid": "5a7979eb-9792-4546-824b-4180be4791ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57664", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1425", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57664\n\ud83d\udd39 Description: An issue in the sqlg_group_node component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T00:21:51.341146\n\ud83d\udd17 References:\n1. https://github.com/openlink/virtuoso-opensource/issues/1211", "creation_timestamp": "2025-01-14T01:07:33.000000Z"}, {"uuid": "2f3763d7-3237-4737-b21b-6dfff3da2b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57663", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1426", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57663\n\ud83d\udd39 Description: An issue in the sqlg_place_dpipes component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T00:21:50.619540\n\ud83d\udd17 References:\n1. https://github.com/openlink/virtuoso-opensource/issues/1218", "creation_timestamp": "2025-01-14T01:07:36.000000Z"}, {"uuid": "4464f0da-9f31-41e6-82c3-1b11ee1e64bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3426", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57665\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: JFinalCMS 1.0 is vulnerable to SQL Injection in rc/main/java/com/cms/entity/Content.java. The cause of the vulnerability is that the title parameter is controllable and is concatenated directly into filterSql without filtering.\n\ud83d\udccf Published: 2025-01-30T00:31:04Z\n\ud83d\udccf Modified: 2025-01-30T00:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-57665\n2. https://github.com/Nbccccc/vulnerability_discovery/blob/main/JFinalCMS/JFinalCms%20SQL%20Injection.md", "creation_timestamp": "2025-01-30T01:12:08.000000Z"}, {"uuid": "136b23fa-19b0-44c9-adc3-5cf7afdc0179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57660", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3e547ie2r", "content": "", "creation_timestamp": "2025-01-14T01:17:48.239535Z"}, {"uuid": "f2a869ad-bdaa-4ce3-8c17-a8bf912f840c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57661", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3e7pa4k2c", "content": "", "creation_timestamp": "2025-01-14T01:17:50.922243Z"}, {"uuid": "0c481251-3b5e-4412-9924-7f8cdf3ca191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113914006663904743", "content": "", "creation_timestamp": "2025-01-29T22:29:59.382213Z"}, {"uuid": "562f1671-14a1-4d3c-9fca-4a32df7ae8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57669", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941555688737056", "content": "", "creation_timestamp": "2025-02-03T19:16:04.167525Z"}, {"uuid": "35e0bd5b-b670-46e7-aa39-212c8033aa0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57668", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113963625201165590", "content": "", "creation_timestamp": "2025-02-07T16:48:38.752457Z"}, {"uuid": "4778521f-21a8-4a71-8ce4-4b85abf2a796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57668", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjsclpxsf26", "content": "", "creation_timestamp": "2025-02-06T19:15:37.398684Z"}, {"uuid": "eef26308-cb83-48ec-a082-b0de5b8ba800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgwjwrp7ic2r", "content": "", "creation_timestamp": "2025-01-30T03:25:16.922403Z"}, {"uuid": "9bb2b915-6c19-48ee-b5a1-1b661ad5dc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "seen", "source": "https://t.me/cvedetector/16715", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57665 - JFinalCMS SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57665 \nPublished : Jan. 29, 2025, 11:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : JFinalCMS 1.0 is vulnerable to SQL Injection in rc/main/java/com/cms/entity/Content.java. The cause of the vulnerability is that the title parameter is controllable and is concatenated directly into filterSql without filtering. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T01:43:21.000000Z"}, {"uuid": "1888a73b-3b22-4869-8501-d9fe45f9e222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57663", "type": "seen", "source": "https://t.me/cvedetector/15226", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57663 - Virtuoso OpenLink SQLg_place_dpipes SQL Injection Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-57663 \nPublished : Jan. 14, 2025, 1:15 a.m. | 37\u00a0minutes ago \nDescription : An issue in the sqlg_place_dpipes component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T03:07:31.000000Z"}, {"uuid": "da8b1c43-11c9-4f5a-b247-344931c9479c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "seen", "source": "Telegram/-3ZnfvrNnHop8WKbSMT_sUZuyDmuehAG3xtN7Qm8nC-kz-vd", "content": "", "creation_timestamp": "2025-01-30T02:17:49.000000Z"}, {"uuid": "c99282fe-c916-48ac-803c-1fee1143b4b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57663", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3eemnlk2f", "content": "", "creation_timestamp": "2025-01-14T01:17:56.072419Z"}, {"uuid": "18c36434-572f-4633-846c-7ba5894fd2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57660", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824536707776133", "content": "", "creation_timestamp": "2025-01-14T03:16:36.224103Z"}, {"uuid": "d38e561b-f4c1-41d4-86ba-42c0674f3828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57661", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824536722901752", "content": "", "creation_timestamp": "2025-01-14T03:16:36.404646Z"}, {"uuid": "1a2d2aa9-e554-4ee7-9dbf-0c0c526bccee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57662", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824536736542597", "content": "", "creation_timestamp": "2025-01-14T03:16:36.749062Z"}, {"uuid": "093195e2-e535-4ee3-aae9-e2ffbad722c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57663", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824595738169137", "content": "", "creation_timestamp": "2025-01-14T03:31:36.949406Z"}, {"uuid": "d8f913d8-b99b-4587-a8d8-f91fff73259e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57660", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1429", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57660\n\ud83d\udd39 Description: An issue in the sqlo_expand_jts component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T00:21:47.244689\n\ud83d\udd17 References:\n1. https://github.com/openlink/virtuoso-opensource/issues/1221", "creation_timestamp": "2025-01-14T01:07:48.000000Z"}, {"uuid": "42a00a9c-e161-4876-9a85-9968681de8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57661", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1428", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57661\n\ud83d\udd39 Description: An issue in the sqlo_df component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T00:21:48.220951\n\ud83d\udd17 References:\n1. https://github.com/openlink/virtuoso-opensource/issues/1220", "creation_timestamp": "2025-01-14T01:07:44.000000Z"}, {"uuid": "67002599-0808-477c-8761-f9c1f1ff65eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57662", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1427", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57662\n\ud83d\udd39 Description: An issue in the sqlg_hash_source component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T00:21:49.669855\n\ud83d\udd17 References:\n1. https://github.com/openlink/virtuoso-opensource/issues/1217", "creation_timestamp": "2025-01-14T01:07:39.000000Z"}, {"uuid": "f4a3952c-6b2a-46e0-898b-94da596b4735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57669", "type": "seen", "source": "https://t.me/cvedetector/17110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57669 - Zrlog Directory Traversal Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-57669 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Directory Traversal vulnerability in Zrlog backup-sql-file.jar v.3.0.31 allows a remote attacker to obtain sensitive information via the BackupController.java file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T22:00:10.000000Z"}, {"uuid": "48d5c827-656d-400d-8d21-a36f64b9a7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57668", "type": "seen", "source": "Telegram/6M2b2OhfadeXI6-XstDvo8M8GUbRkDHDHOFCL8A7MOALbVHF", "content": "", "creation_timestamp": "2025-03-02T11:46:30.000000Z"}, {"uuid": "669b01ac-0f53-4c20-af20-8b49a752555a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57664", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824595752014413", "content": "", "creation_timestamp": "2025-01-14T03:31:37.727858Z"}, {"uuid": "bcdd9bcb-3c49-40a8-bd5a-82acee29bba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57664", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3eguzqv2t", "content": "", "creation_timestamp": "2025-01-14T01:17:58.440675Z"}, {"uuid": "4289c1e8-f469-45d2-83c9-8e9ffacfdf8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57662", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3ec2t5l2p", "content": "", "creation_timestamp": "2025-01-14T01:17:53.516975Z"}, {"uuid": "754b9489-59e5-4689-a4f2-e87038e202ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57665", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgw3ypsaat2f", "content": "", "creation_timestamp": "2025-01-29T23:15:48.457320Z"}, {"uuid": "e6b5f306-5455-4811-bd74-480428b7ef97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57668", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958487949902692", "content": "", "creation_timestamp": "2025-02-06T19:02:09.932847Z"}, {"uuid": "4149623d-d788-49e8-a20b-9d479e4bfba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57669", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhced2cuzy2b", "content": "", "creation_timestamp": "2025-02-03T20:16:42.659898Z"}]}