{"vulnerability": "cve-2024-8784", "sightings": [{"uuid": "62524178-b785-47a3-bfe3-8587c14454aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8784", "type": "seen", "source": "https://t.me/cvedetector/5648", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8784 - QDocs Smart School Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8784 \nPublished : Sept. 13, 2024, 7:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T22:09:13.000000Z"}]}