{"vulnerability": "cve-2024-9093", "sightings": [{"uuid": "80ee4428-25c7-4e5e-bde0-edac5cfdfa4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9093", "type": "seen", "source": "https://t.me/cvedetector/6168", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9093 - SourceCodester Profile Registration SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-9093 \nPublished : Sept. 23, 2024, 1:15 a.m. | 27\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in SourceCodester Profile Registration without Reload Refresh 1.0. This affects an unknown part of the file del.php of the component GET Parameter Handler. The manipulation of the argument list leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T03:46:27.000000Z"}]}