{"vulnerability": "CVE-2024-1074", "sightings": [{"uuid": "62e7418a-604b-4f60-b9fd-10f7f8a74e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10747", "type": "seen", "source": "https://t.me/cvedetector/9664", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10747 - PHPGurukul Online Shopping Portal Datatables Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10747 \nPublished : Nov. 4, 2024, 12:15 a.m. | 35\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_th.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T01:52:53.000000Z"}, {"uuid": "7943e81d-d7b6-455f-a70e-e7d444cf54df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10748", "type": "seen", "source": "https://t.me/cvedetector/9666", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10748 - Cosmote Greece What's Up App Cryptographic Key Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10748 \nPublished : Nov. 4, 2024, 1:15 a.m. | 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in Cosmote Greece What's Up App 4.47.3 on Android. This issue affects some unknown processing of the file gr/desquared/kmmsharedmodule/db/RealmDB.java of the component Realm Database Handler. The manipulation of the argument defaultRealmKey leads to use of default cryptographic key. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T02:43:04.000000Z"}, {"uuid": "cfa09641-9626-4a26-8ffd-0f01f484e8ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10749", "type": "seen", "source": "https://t.me/cvedetector/9665", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10749 - ThinkAdmin Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10749 \nPublished : Nov. 4, 2024, 1:15 a.m. | 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T02:43:03.000000Z"}, {"uuid": "015a75ea-32cb-4fec-93ce-c561ccd397c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10746", "type": "seen", "source": "https://t.me/cvedetector/9663", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10746 - PHPGurukul Online Shopping Portal: Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10746 \nPublished : Nov. 4, 2024, 12:15 a.m. | 35\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in PHPGurukul Online Shopping Portal 2.0. This affects an unknown part of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data.php. The manipulation of the argument scripts leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T01:52:53.000000Z"}, {"uuid": "aabf8775-5527-496d-8923-14a719c92d6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10744", "type": "seen", "source": "https://t.me/cvedetector/9661", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10744 - PHPGurukul Online Shopping Portal CSRF (Cross Site Scripting)\", \n  \"Content\": \"CVE ID : CVE-2024-10744 \nPublished : Nov. 3, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/complex_header_2.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T01:02:46.000000Z"}, {"uuid": "6a26f270-feb4-499e-bdf2-2bcf3bb16a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10745", "type": "seen", "source": "https://t.me/cvedetector/9662", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10745 - PHPGurukul Online Shopping Portal Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-10745 \nPublished : Nov. 3, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/deferred_table.php. The manipulation of the argument scripts leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T01:02:47.000000Z"}, {"uuid": "a7cacb1b-8a72-47aa-b7ec-18a621a474f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10743", "type": "seen", "source": "https://t.me/cvedetector/9660", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10743 - PHPGurukul Online Shopping Portal Data Tables Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10743 \nPublished : Nov. 3, 2024, 10:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been classified as problematic. Affected is an unknown function of the file /shopping/admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php. The manipulation of the argument value leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T00:12:41.000000Z"}, {"uuid": "5c39767a-ecf2-47b7-a324-97bc3f832b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10742", "type": "seen", "source": "https://t.me/cvedetector/9659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10742 - Code-projects Wazifa System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10742 \nPublished : Nov. 3, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Wazifa System 1.0 and classified as critical. This issue affects some unknown processing of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-03T23:22:30.000000Z"}, {"uuid": "9a743caa-afb0-4c18-86c4-a9dd56af4454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10741", "type": "seen", "source": "https://t.me/cvedetector/9658", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10741 - Code-projects E-Health Care System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10741 \nPublished : Nov. 3, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects E-Health Care System 1.0 and classified as critical. This vulnerability affects unknown code of the file /Users/registration.php. The manipulation of the argument f_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-03T23:22:29.000000Z"}, {"uuid": "3ed09395-acc4-42e9-ab21-bd23937837b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10740", "type": "seen", "source": "https://t.me/cvedetector/9657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10740 - Code-projects E-Health Care System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10740 \nPublished : Nov. 3, 2024, 8:15 p.m. | 20\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in code-projects E-Health Care System up to 1.0. This affects an unknown part of the file /Admin/consulting_detail.php. The manipulation of the argument consulting_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-03T21:42:13.000000Z"}]}