{"vulnerability": "CVE-2024-1296", "sightings": [{"uuid": "eb816925-be16-4330-ac1f-1ae8b7bfeacf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12960", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113720336433090004", "content": "", "creation_timestamp": "2024-12-26T17:37:06.305006Z"}, {"uuid": "f396519f-b68b-45a9-8d09-6feadfa78923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12961", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113720432239573683", "content": "", "creation_timestamp": "2024-12-26T18:01:28.103353Z"}, {"uuid": "25511e59-45a5-48f7-8b89-53a616ba2fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12962", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113720670272522449", "content": "", "creation_timestamp": "2024-12-26T19:02:00.464986Z"}, {"uuid": "0817f1f6-c056-4592-a7d8-2a7c6b52b628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12963", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113720813157342640", "content": "", "creation_timestamp": "2024-12-26T19:38:20.607683Z"}, {"uuid": "d0c5f2c5-d614-4d68-bc08-177fca7115d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12964", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113720908529913266", "content": "", "creation_timestamp": "2024-12-26T20:02:35.753655Z"}, {"uuid": "0023fa57-e25b-4b9c-9d09-d5f1099a9ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12965", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113721045858695417", "content": "", "creation_timestamp": "2024-12-26T20:37:31.227955Z"}, {"uuid": "d653f4ff-58f2-42c2-8791-89a90a322ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12966", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113721140540808089", "content": "", "creation_timestamp": "2024-12-26T21:01:36.001787Z"}, {"uuid": "cfbd6249-618b-4f25-9c83-67d09250412c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12967", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113721264813426211", "content": "", "creation_timestamp": "2024-12-26T21:33:12.319642Z"}, {"uuid": "99e52448-6878-45f1-b199-12a382461d94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12968", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113721385308527959", "content": "", "creation_timestamp": "2024-12-26T22:03:50.791014Z"}, {"uuid": "3c12f12a-5ed2-4686-97f6-4f93745816b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12969", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leam4pdojb25", "content": "", "creation_timestamp": "2024-12-26T23:15:25.059922Z"}, {"uuid": "d7a48478-8794-4abf-9132-8d95aff0de0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12969", "type": "seen", "source": "https://t.me/cvedetector/13704", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12969 - Code-projects Hospital Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12969 \nPublished : Dec. 26, 2024, 11:15 p.m. | 34\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T00:56:07.000000Z"}, {"uuid": "36248e21-96a1-4963-9b25-c2883d362f54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12960", "type": "seen", "source": "https://t.me/cvedetector/13689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12960 - Apache MCA 1.0 SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12960 \nPublished : Dec. 26, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. This issue affects some unknown processing of the file /update_edu_details.php. The manipulation of the argument q leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T19:55:01.000000Z"}, {"uuid": "bef53042-4409-4800-ba2f-0efd7fee2765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12961", "type": "seen", "source": "https://t.me/cvedetector/13688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12961 - Apache MCA Portfolio Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12961 \nPublished : Dec. 26, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /update_ach_details.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T19:55:00.000000Z"}, {"uuid": "d87d5463-7381-4d40-93b8-c106bb392290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12966", "type": "seen", "source": "https://t.me/cvedetector/13694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12966 - \"Code-projects Job Recruitment SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-12966 \nPublished : Dec. 26, 2024, 9:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Job Recruitment 1.0. It has been rated as critical. This issue affects the function cn_update of the file /_parse/_all_edits.php. The manipulation of the argument cname/url leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T23:15:42.000000Z"}, {"uuid": "3d7436ae-f88b-4cce-95e2-5e0001b995a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12963", "type": "seen", "source": "https://t.me/cvedetector/13693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12963 - Code-projects Job Recruitment SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12963 \nPublished : Dec. 26, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. Affected by this issue is the function add_xp of the file /_parse/_all_edits.php. The manipulation of the argument job_company leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T22:25:32.000000Z"}, {"uuid": "42775568-2f2d-4bce-9958-e3fdda52f2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12964", "type": "seen", "source": "https://t.me/cvedetector/13692", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12964 - \"1000 Projects Daily College Class Work Report Book SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12964 \nPublished : Dec. 26, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Daily College Class Work Report Book 1.0. It has been classified as critical. This affects an unknown part of the file /login.php. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T22:25:32.000000Z"}, {"uuid": "3d12fbb7-71ec-4e35-a8d2-53f69fd7aab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12962", "type": "seen", "source": "https://t.me/cvedetector/13691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12962 - Code-Projects Job Recruitment SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12962 \nPublished : Dec. 26, 2024, 7:15 p.m. | 24\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /_parse/_all_edits.php. The manipulation of the argument skillset leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T20:45:11.000000Z"}, {"uuid": "ef88a4fa-92ca-446d-be9e-0dbe3396bd33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12967", "type": "seen", "source": "https://t.me/cvedetector/13703", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12967 - Code-Projects Job Recruitment SQL Injectionazard\", \n  \"Content\": \"CVE ID : CVE-2024-12967 \nPublished : Dec. 26, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. Affected is the function fln_update of the file /_parse/_all_edits.php. The manipulation of the argument fname/lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T00:06:00.000000Z"}, {"uuid": "8da8d027-2ddd-44d1-b437-5b9dbc824c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12968", "type": "seen", "source": "https://t.me/cvedetector/13702", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12968 - Code-projects Job Recruitment SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12968 \nPublished : Dec. 26, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. Affected by this vulnerability is the function edit_jobpost of the file /_parse/_all_edits.php. The manipulation of the argument jobtype leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T00:05:59.000000Z"}, {"uuid": "29ed9c27-ae9e-431a-aac5-555890f860a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12965", "type": "seen", "source": "https://t.me/cvedetector/13696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12965 - 1000 Projects Portfolio Management System MCA SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12965 \nPublished : Dec. 26, 2024, 9:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /update_ex_detail.php. The manipulation of the argument q leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T23:15:43.000000Z"}, {"uuid": "a2a04a1c-419c-4ec0-9772-fb9e2c8f45fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12960", "type": "seen", "source": "Telegram/ODtKmxSagRGGLPM4CIfDJmidYPfyTP6byVWy0cFtYJWeJzjQ", "content": "", "creation_timestamp": "2025-03-02T11:46:30.000000Z"}]}