{"vulnerability": "CVE-2020-24913", "sightings": [{"uuid": "a795e8f6-6b45-4619-a7ec-19b0fede69df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24913", "type": "seen", "source": "https://t.me/arpsyndicate/4859", "content": "#ExploitObserverAlert\n\nCVE-2020-24913\n\nDESCRIPTION: Exploit Observer has 16 entries in 4 file formats related to CVE-2020-24913. A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.\n\nFIRST-EPSS: 0.002480000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9634872", "creation_timestamp": "2024-04-25T20:42:14.000000Z"}, {"uuid": "67559f7a-58c8-42a7-a0fa-acf2533c7814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24913", "type": "published-proof-of-concept", "source": "Telegram/nDkGu6Dp5i6ryUUUcoMP1pNfnhsyQqgPRa1QKjOdLJu8WNk", "content": "", "creation_timestamp": "2025-05-12T05:00:06.000000Z"}, {"uuid": "7a1d1dfb-90af-4171-8f85-1eb95a3b6e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24913", "type": "seen", "source": "https://t.me/cibsecurity/24447", "content": "\u203c CVE-2020-24913 \u203c\n\nA SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-04T16:46:33.000000Z"}]}