{"vulnerability": "CVE-2024-1300", "sightings": [{"uuid": "32a7b2e4-c9a4-47a6-b547-4ebedc96966f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13000", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113733794445286217", "content": "", "creation_timestamp": "2024-12-29T02:39:39.410660Z"}, {"uuid": "23fd05c8-a689-4c64-bf69-9146b3d632f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113733879827233928", "content": "", "creation_timestamp": "2024-12-29T03:01:22.113899Z"}, {"uuid": "304d8bab-5fd5-4dcc-b7e2-e47c4cb6222b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13000", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leg2hu7j3p2m", "content": "", "creation_timestamp": "2024-12-29T03:15:30.066934Z"}, {"uuid": "db9607f0-c95b-4403-918f-848a3ada597e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13001", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leg2hwequ522", "content": "", "creation_timestamp": "2024-12-29T03:15:32.231587Z"}, {"uuid": "3dbb592b-b739-4785-aa86-bc022fa788ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13002", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113734037049325929", "content": "", "creation_timestamp": "2024-12-29T03:41:21.027689Z"}, {"uuid": "4d28b7dc-336f-41ee-9f33-3c8a65c164e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13003", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113734151667545379", "content": "", "creation_timestamp": "2024-12-29T04:10:30.126619Z"}, {"uuid": "bcedce45-f384-420e-ad19-69e960d2f0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13002", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leg5sxkdtl2l", "content": "", "creation_timestamp": "2024-12-29T04:15:24.452602Z"}, {"uuid": "54e1fa09-16b3-4a54-9a9b-12ced4980957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13003", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leg5sztrho2i", "content": "", "creation_timestamp": "2024-12-29T04:15:26.260444Z"}, {"uuid": "26d09d89-48b1-446f-a119-4fbafb8a2780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13004", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113734732444893707", "content": "", "creation_timestamp": "2024-12-29T06:38:12.166498Z"}, {"uuid": "668f538e-05b8-4eed-9bf7-687c95cf14ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13004", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leghusyvmu2k", "content": "", "creation_timestamp": "2024-12-29T07:15:23.633454Z"}, {"uuid": "3d20c589-fd9f-4b57-9141-2e6beed669c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13005", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113734957541914206", "content": "", "creation_timestamp": "2024-12-29T07:35:26.756371Z"}, {"uuid": "5fce845b-3789-4235-9c85-d2aabd30a401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13006", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113735093418778305", "content": "", "creation_timestamp": "2024-12-29T08:10:00.107285Z"}, {"uuid": "b34fc88f-0647-4bdd-a15d-72c5ad52c222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13005", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legladbxah2k", "content": "", "creation_timestamp": "2024-12-29T08:15:31.286623Z"}, {"uuid": "1dde54ee-25c5-4e52-9bb8-874d0778d3f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13006", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leglafsctt2e", "content": "", "creation_timestamp": "2024-12-29T08:15:33.607826Z"}, {"uuid": "7d823619-4242-44d1-ab00-5ea15353fcb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113735208022534122", "content": "", "creation_timestamp": "2024-12-29T08:39:08.661862Z"}, {"uuid": "3a0d43cb-bc74-4646-bbb7-a11578547ad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13007", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legolgxqlr2m", "content": "", "creation_timestamp": "2024-12-29T09:15:25.271767Z"}, {"uuid": "e1771c88-030d-4f62-9375-7440dc6d8584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113735432795561317", "content": "", "creation_timestamp": "2024-12-29T09:36:18.491248Z"}, {"uuid": "49f9b090-0c8d-4c09-b041-cbdbd853666a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13008", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legrwscqpy25", "content": "", "creation_timestamp": "2024-12-29T10:15:27.826990Z"}, {"uuid": "ca60e6c7-304c-4a8a-a241-2c520bdd71a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/113", "content": "", "creation_timestamp": "2025-05-09T07:39:10.000000Z"}, {"uuid": "0f652d8d-0741-4f0c-ac11-2f725ace37b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeux6e4m24", "content": "", "creation_timestamp": "2025-09-30T01:31:29.240025Z"}, {"uuid": "04e63097-f5c2-47f0-8a4b-4354807780fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looipib42pd2", "content": "", "creation_timestamp": "2025-05-08T19:43:10.375207Z"}, {"uuid": "b99de6d9-f9ab-4f1c-9e0d-037bdcf55553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loqgnz63bx2j", "content": "", "creation_timestamp": "2025-05-09T12:32:14.989738Z"}, {"uuid": "9ebef525-c121-4d10-b419-a59fa9e064df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3maejvlprok2h", "content": "", "creation_timestamp": "2025-12-19T20:31:49.512347Z"}, {"uuid": "da32e17c-7ca1-44a0-bcbb-665c2bd6082f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m326cbqdaj24", "content": "", "creation_timestamp": "2025-10-13T02:31:30.883349Z"}, {"uuid": "da0c8182-0ba7-40ed-88f2-72cc7e8c7401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://t.me/cvedetector/24852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13009 - Eclipse Jetty Gzip Buffer Release Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13009 \nPublished : May 8, 2025, 6:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request  \nbody. This can result in corrupted and/or inadvertent sharing of data between requests. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T21:48:21.000000Z"}, {"uuid": "d252000e-fa37-4f46-bfcf-3bee3ed3157e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/43ff9e04-da8f-45fe-a06a-e8f9b84a2d14", "content": "", "creation_timestamp": "2025-09-11T13:37:23.512990Z"}, {"uuid": "1ae28f55-0d22-4fc0-b9df-0063221589a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-13009", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "58b4e8c7-d7b9-4f7f-8835-6b603bdc23b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13009", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15583", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13009\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request\nbody. This can result in corrupted and/or inadvertent sharing of data between requests.\n\ud83d\udccf Published: 2025-05-08T17:29:31.380Z\n\ud83d\udccf Modified: 2025-05-08T17:29:31.380Z\n\ud83d\udd17 References:\n1. https://gitlab.eclipse.org/security/cve-assignement/-/issues/48\n2. https://github.com/jetty/jetty.project/security/advisories/GHSA-q4rv-gq96-w7c5", "creation_timestamp": "2025-05-08T18:24:29.000000Z"}, {"uuid": "16ef412c-1749-4be4-96aa-fc6153d112eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13002", "type": "seen", "source": "https://t.me/cvedetector/13853", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13002 - \"1000 Projects Bookstore Management System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-13002 \nPublished : Dec. 29, 2024, 4:15 a.m. | 21\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /order_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T05:40:10.000000Z"}, {"uuid": "021181e3-53c2-4665-ab29-bd96ce1c7a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13007", "type": "seen", "source": "https://t.me/cvedetector/13870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13007 - Codezips Event Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13007 \nPublished : Dec. 29, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Codezips Event Management System 1.0. Affected is an unknown function of the file /contact.php. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T10:41:19.000000Z"}, {"uuid": "624ee861-b94a-44e4-b134-4d957943d770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13003", "type": "seen", "source": "https://t.me/cvedetector/13852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13003 - \"1000 Projects Portfolio Management System MCA SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13003 \nPublished : Dec. 29, 2024, 4:15 a.m. | 21\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /update_ed.php. The manipulation of the argument e_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T05:40:09.000000Z"}, {"uuid": "0a685fbe-69b5-4eb4-b45f-9118798713bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13000", "type": "seen", "source": "https://t.me/cvedetector/13851", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13000 - PHPGurukul Small CRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13000 \nPublished : Dec. 29, 2024, 3:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Small CRM 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/quote-details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T04:50:04.000000Z"}, {"uuid": "3baeeeed-3a62-4eaf-97e2-ab350c540ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13001", "type": "seen", "source": "https://t.me/cvedetector/13850", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13001 - PHPGurukul Small CRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13001 \nPublished : Dec. 29, 2024, 3:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Small CRM 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T04:50:04.000000Z"}, {"uuid": "4c6ab234-a75b-4f03-b439-7290692130c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1300", "type": "seen", "source": "https://t.me/ctinow/180572", "content": "https://ift.tt/zIyHvBR\nCVE-2024-1300", "creation_timestamp": "2024-02-07T08:41:50.000000Z"}, {"uuid": "144c099f-fd74-4bd4-b22d-086ade18c27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13008", "type": "seen", "source": "https://t.me/cvedetector/13873", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13008 - Code-projects Responsive Hotel Site SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13008 \nPublished : Dec. 29, 2024, 10:15 a.m. | 43\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T12:21:40.000000Z"}, {"uuid": "817e6b9e-2cd6-4210-9576-16a789e23b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13005", "type": "seen", "source": "https://t.me/cvedetector/13860", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13005 - \"1000 Projects Attendance Tracking Management System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-13005 \nPublished : Dec. 29, 2024, 8:15 a.m. | 34\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in 1000 Projects Attendance Tracking Management System 1.0. This vulnerability affects unknown code of the file /admin/attendance_action.php. The manipulation of the argument attendance_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T09:50:59.000000Z"}, {"uuid": "85015696-e8aa-4f9d-be57-81b1833f7e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13006", "type": "seen", "source": "https://t.me/cvedetector/13859", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13006 - Cisco 1000 Projects Human Resource Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13006 \nPublished : Dec. 29, 2024, 8:15 a.m. | 34\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in 1000 Projects Human Resource Management System 1.0. This issue affects some unknown processing of the file /employeeview.php. The manipulation of the argument search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T09:50:59.000000Z"}, {"uuid": "28c32243-da95-41ab-87c1-b53bc943164b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13004", "type": "seen", "source": "https://t.me/cvedetector/13858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13004 - PHPGurukul Complaint Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13004 \nPublished : Dec. 29, 2024, 7:15 a.m. | 43\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/category.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T09:00:50.000000Z"}, {"uuid": "aa462ac7-4cc2-4779-b8e0-db155eeb8278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1300", "type": "seen", "source": "https://t.me/ctinow/197786", "content": "https://ift.tt/d95qA1t\nCVE-2024-1300 | Vert.x up to 4.5.2 SNI memory leak", "creation_timestamp": "2024-03-01T16:52:10.000000Z"}]}