{"vulnerability": "CVE-2024-12951", "sightings": [{"uuid": "799b64b0-6de4-42c6-9ddc-1676d449c26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12951", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le7klrcclq2c", "content": "", "creation_timestamp": "2024-12-26T13:15:23.286395Z"}, {"uuid": "2466f68a-ecc0-4345-9e45-1c025022a69b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12951", "type": "seen", "source": "https://t.me/cvedetector/13679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12951 - \"1000 Projects Portfolio Management System MCA PHP Unrestricted File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12951 \nPublished : Dec. 26, 2024, 1:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T14:54:05.000000Z"}]}