{"vulnerability": "CVE-2024-1297", "sightings": [{"uuid": "220b2452-947c-42bd-8a79-c1935e1bda8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12977", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722323447112270", "content": "", "creation_timestamp": "2024-12-27T02:02:25.995609Z"}, {"uuid": "ac24111a-8578-4f9b-9c61-85d1674a5a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12976", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leaw6jiwpo2k", "content": "", "creation_timestamp": "2024-12-27T02:15:23.854245Z"}, {"uuid": "bd70646d-6c9a-4ea9-8bb8-1dd8e0a049f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12977", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leaw6lwpoc2i", "content": "", "creation_timestamp": "2024-12-27T02:15:26.132277Z"}, {"uuid": "16d7a9d9-63cd-4ba9-ab1b-4c9d735cf1e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12978", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leb4vfytxw2k", "content": "", "creation_timestamp": "2024-12-27T04:15:33.586343Z"}, {"uuid": "f2e988b7-2d12-4bfe-a7ba-1294324c64f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12979", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722915450338331", "content": "", "creation_timestamp": "2024-12-27T04:32:58.973982Z"}, {"uuid": "40784f0b-e269-4175-8ea6-69d13a7eeb5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12979", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113722933120796706", "content": "", "creation_timestamp": "2024-12-27T04:37:28.661392Z"}, {"uuid": "91831b16-e631-4f87-b9cd-8e9c06743a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12979", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebaaqpm6z2a", "content": "", "creation_timestamp": "2024-12-27T05:15:35.927056Z"}, {"uuid": "83ed3382-3787-47d4-bd4d-1c83ef45f968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12970", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf34emq3gx2o", "content": "", "creation_timestamp": "2025-01-06T12:15:23.451461Z"}, {"uuid": "5453e1b6-9df7-44dc-8797-fb0ca089e3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12970", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf367ak26k2q", "content": "", "creation_timestamp": "2025-01-06T12:48:10.351604Z"}, {"uuid": "354748cf-2a3a-4527-a3d7-0f618fb2259a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12970", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad6g5ec24", "content": "", "creation_timestamp": "2025-01-20T21:02:10.094789Z"}, {"uuid": "7b113253-f641-432a-a7ed-d73396d50320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ll7fwfod622f", "content": "", "creation_timestamp": "2025-03-25T13:48:12.651412Z"}, {"uuid": "2d585df9-2475-4878-9011-94cc73f0d45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lklcf3k33y2w", "content": "", "creation_timestamp": "2025-03-17T13:51:35.682834Z"}, {"uuid": "6f1a6885-8ad8-4b5b-a21a-e708e944d4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "1db49d95-7525-4000-8fa1-6b76b6a61b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmdep7fpg42t", "content": "", "creation_timestamp": "2025-04-08T21:02:09.749731Z"}, {"uuid": "948da26a-c0c3-48eb-a989-89a27272ad6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12970", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "1718f912-6066-4326-851c-68a8529ac948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pandora_fms_auth_rce_cve_2024_12971.rb", "content": "", "creation_timestamp": "2025-04-08T05:57:06.000000Z"}, {"uuid": "373bdc3b-47b3-4e16-b694-13527c9b0e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://t.me/cvedetector/20456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12971 - Pandora FMS OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12971 \nPublished : March 17, 2025, 10:15 a.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in a Command vulnerability allows OS Command Injection.This issue affects Pandora FMS from 700 to 777.6 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T13:17:08.000000Z"}, {"uuid": "3cb0a39b-d95b-43e3-9d97-495338f06e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12975", "type": "seen", "source": "https://t.me/cvedetector/19854", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12975 - Cisco CPC Buffer Overread Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12975 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:48:12.000000Z"}, {"uuid": "e02e07aa-41ab-4369-9d72-5f43b90a21c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6870", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12975\n\ud83d\udd25 CVSS Score: 1 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface.\n\ud83d\udccf Published: 2025-03-07T16:41:10.424Z\n\ud83d\udccf Modified: 2025-03-07T17:22:04.602Z\n\ud83d\udd17 References:\n1. https://community.silabs.com/069Vm00000LWXMeIAP\n2. https://github.com/SiliconLabs/simplicity_sdk/releases", "creation_timestamp": "2025-03-07T17:35:22.000000Z"}, {"uuid": "71ae5b06-de42-4fe7-bf5f-61bf91f88444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12971", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7749", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12971\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/S:N/AU:Y/R:U/V:C/RE:L/U:Green)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in a Command vulnerability allows OS Command Injection.This issue affects Pandora FMS from 700 to 777.6\n\ud83d\udccf Published: 2025-03-17T09:19:31.761Z\n\ud83d\udccf Modified: 2025-03-17T09:19:31.761Z\n\ud83d\udd17 References:\n1. https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", "creation_timestamp": "2025-03-17T09:46:57.000000Z"}, {"uuid": "65df01dd-e26d-4e2b-a5b8-5ef4793b0085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12979", "type": "seen", "source": "https://t.me/cvedetector/13710", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12979 - Code-Projects Job Recruitment Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12979 \nPublished : Dec. 27, 2024, 5:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Job Recruitment 1.0 and classified as problematic. This issue affects the function cn_update of the file /_parse/_all_edits.php. The manipulation of the argument cname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T06:47:19.000000Z"}, {"uuid": "def56f6b-f470-45ea-9f61-16edb9371aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12978", "type": "seen", "source": "https://t.me/cvedetector/13708", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12978 - Code-Projects Job Recruitment SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12978 \nPublished : Dec. 27, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as critical. This vulnerability affects the function add_req of the file /_parse/_all_edits.php. The manipulation of the argument jid/limit leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T05:57:08.000000Z"}, {"uuid": "eaf566f3-0ba7-48ca-adb8-fb90131d2e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12976", "type": "seen", "source": "https://t.me/cvedetector/13707", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12976 - CodeZips Hospital Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12976 \nPublished : Dec. 27, 2024, 2:15 a.m. | 46\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in CodeZips Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /staff.php. The manipulation of the argument tel leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T04:16:47.000000Z"}, {"uuid": "8795942e-575d-4d67-9c8a-281ddeeffbca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12977", "type": "seen", "source": "https://t.me/cvedetector/13705", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12977 - PHPGurukul Complaint Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12977 \nPublished : Dec. 27, 2024, 2:15 a.m. | 46\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/state.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T04:16:46.000000Z"}, {"uuid": "49b9a51b-d664-463e-9591-93443cd9dd1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12970", "type": "seen", "source": "https://t.me/cvedetector/14358", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12970 - TUBITAK BILGEM Pardus OS My Computer OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12970 \nPublished : Jan. 6, 2025, 12:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2. \nSeverity: 3.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T14:25:26.000000Z"}, {"uuid": "4b868df0-2f0a-4d9b-94de-c254a3cfc605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1297", "type": "seen", "source": "https://t.me/arpsyndicate/3706", "content": "#ExploitObserverAlert\n\nCVE-2024-1297\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1297. Loomio version 2.22.0 allows executing arbitrary commands on the server.  This is possible because the application is vulnerable to OS Command Injection.\n\nFIRST-EPSS: 0.000660000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2024-02-21T07:00:44.000000Z"}, {"uuid": "a563cfd8-b134-4ef2-aae4-6aabb2d1a555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1297", "type": "seen", "source": "https://t.me/ctinow/188018", "content": "https://ift.tt/LoTyRJi\nCVE-2024-1297", "creation_timestamp": "2024-02-20T01:26:33.000000Z"}, {"uuid": "602202f6-9d17-48c8-b153-0b989bb81a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1297", "type": "seen", "source": "https://t.me/ctinow/188014", "content": "https://ift.tt/LoTyRJi\nCVE-2024-1297", "creation_timestamp": "2024-02-20T01:21:35.000000Z"}]}