{"vulnerability": "CVE-2024-1302", "sightings": [{"uuid": "8513dc73-4d81-49a8-b7af-e5adbd2d70ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13020", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113737675775565147", "content": "", "creation_timestamp": "2024-12-29T19:06:43.637925Z"}, {"uuid": "339ed7bd-d34d-40ab-940b-01c62b7ca012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13020", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehq4h4o4b2m", "content": "", "creation_timestamp": "2024-12-29T19:15:30.915464Z"}, {"uuid": "a388c627-c365-47db-ad2b-1b01ec670810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13022", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113737904535445026", "content": "", "creation_timestamp": "2024-12-29T20:04:54.251268Z"}, {"uuid": "c50c808a-73bc-46c2-b9e5-cfea11c6473b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13021", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehthiji6o22", "content": "", "creation_timestamp": "2024-12-29T20:15:21.864220Z"}, {"uuid": "ff7c24cc-7e0f-42e3-87bd-4a31b2f28ecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13022", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehthkpx3622", "content": "", "creation_timestamp": "2024-12-29T20:15:24.891841Z"}, {"uuid": "30807bba-e8b5-4af1-b3db-f1488f894104", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738010318555474", "content": "", "creation_timestamp": "2024-12-29T20:31:48.323143Z"}, {"uuid": "13dca848-9b46-4681-bb99-4c8feae41352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13024", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738133305922144", "content": "", "creation_timestamp": "2024-12-29T21:03:05.239034Z"}, {"uuid": "3f272379-112f-4c3b-9c45-d491865f6477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13023", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehwstbwtq2m", "content": "", "creation_timestamp": "2024-12-29T21:15:33.596215Z"}, {"uuid": "534ccf25-6e45-4049-89d7-0abf22e7c13d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13024", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehwsvkwqb2i", "content": "", "creation_timestamp": "2024-12-29T21:15:37.019204Z"}, {"uuid": "5e86e313-5bab-4d43-92a3-bd8505d4b1a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13025", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738488177848249", "content": "", "creation_timestamp": "2024-12-29T22:33:19.912177Z"}, {"uuid": "3fcab739-eb6f-4665-b7ad-c99af55d61cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13028", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738611185027596", "content": "", "creation_timestamp": "2024-12-29T23:04:36.862646Z"}, {"uuid": "db21d334-be65-4754-b8af-6ddc0fcf7226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13029", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738738400003723", "content": "", "creation_timestamp": "2024-12-29T23:36:57.969655Z"}, {"uuid": "ec4d57b6-1a75-4bb6-9da9-36dcb29914e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13026", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxmdq5yhp2n", "content": "", "creation_timestamp": "2025-01-17T20:15:46.321069Z"}, {"uuid": "50eb739a-5ab6-4904-8432-5402d6408d7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13026", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxnxfthnx2e", "content": "", "creation_timestamp": "2025-01-17T20:44:42.543881Z"}, {"uuid": "87fad2b8-af77-4df6-9a4b-6fa2c9de1f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13026", "type": "seen", "source": "https://t.me/cvedetector/15737", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13026 - \"Algo Edge Navify Algorithm Suite Authentication Token Manipulation\"\", \n  \"Content\": \"CVE ID : CVE-2024-13026 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability exists in Algo Edge up to 2.1.1 - a previously used (legacy) component of navify\u00ae Algorithm Suite.  The vulnerability impacts the authentication mechanism of this component and could allow an attacker with adjacent access to the laboratory network and the Algo Edge system to craft valid authentication tokens and access the component. Other components of navify\u00ae Algorithm Suite are not affected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:57.000000Z"}, {"uuid": "023c9bd4-6762-4bea-8856-944afddada6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13021", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3781", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13021\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-12-29T20:15:05.043\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Road%20Accident%20Map%20Marker.md\n2. https://vuldb.com/?ctiid.289712\n3. https://vuldb.com/?id.289712\n4. https://vuldb.com/?submit.469267\n5. https://www.sourcecodester.com/\n6. https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Road%20Accident%20Map%20Marker.md", "creation_timestamp": "2025-02-01T21:26:34.000000Z"}, {"uuid": "c9388fc6-e51c-4ed5-b236-92d51c486e15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13024", "type": "seen", "source": "https://t.me/cvedetector/13905", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13024 - Codezips Blood Bank Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13024 \nPublished : Dec. 29, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /campaign.php. The manipulation of the argument cname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T23:14:39.000000Z"}, {"uuid": "b2dc46bd-cda4-48a2-9447-1b1476b5bcf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13021", "type": "seen", "source": "https://t.me/cvedetector/13904", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13021 - SourceCodester Road Accident Map Marker Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13021 \nPublished : Dec. 29, 2024, 8:15 p.m. | 18\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in SourceCodester Road Accident Map Marker 1.0. Affected by this issue is some unknown functionality of the file /endpoint/add-mark.php. The manipulation of the argument mark_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T21:34:19.000000Z"}, {"uuid": "b5d9c95a-79d9-4b54-b2c9-d567338f80d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13022", "type": "seen", "source": "https://t.me/cvedetector/13903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13022 - Taisan Tarzan-cms Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13022 \nPublished : Dec. 29, 2024, 8:15 p.m. | 18\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in taisan tarzan-cms 1.0.0. This affects the function UploadResponse of the file src/main/java/com/tarzan/cms/modules/admin/controller/common/UploadController.java of the component Article Management. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T21:34:18.000000Z"}, {"uuid": "6e444719-4dcb-4e6c-b62f-96f889cd2780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13029", "type": "seen", "source": "https://t.me/cvedetector/13909", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13029 - Antabot White-Jotter SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13029 \nPublished : Dec. 30, 2024, 12:15 a.m. | 22\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in Antabot White-Jotter up to 0.2.2. Affected is an unknown function of the file /admin/content/book of the component Edit Book Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T01:45:02.000000Z"}, {"uuid": "97129ffc-c5a9-42d5-b42f-997cca401b75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13025", "type": "seen", "source": "https://t.me/cvedetector/13908", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13025 - Codezips College Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-13025 \nPublished : Dec. 29, 2024, 11:15 p.m. | 30\u00a0minutes ago \nDescription : A vulnerability was found in Codezips College Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Front-end/faculty.php. The manipulation of the argument book_name/book_author leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T00:54:56.000000Z"}, {"uuid": "482e5e0e-34de-4a7d-8493-374e9c4eb751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13023", "type": "seen", "source": "Telegram/cwj5DoCvhQJY-uTdEgjmMsC70hhjm1zPLiaFtucxaYVDLDfs", "content": "", "creation_timestamp": "2025-02-18T21:11:33.000000Z"}, {"uuid": "a8340d46-2fe3-4378-848f-a4c5d1b09189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13028", "type": "seen", "source": "https://t.me/cvedetector/13907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13028 - Antabot White-Jotter Remote File Processing Username Verification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13028 \nPublished : Dec. 29, 2024, 11:15 p.m. | 30\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in Antabot White-Jotter up to 0.2.2. This issue affects some unknown processing of the file /login. The manipulation of the argument username leads to observable response discrepancy. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T00:54:56.000000Z"}, {"uuid": "07675859-8b70-4e79-ba20-708c219c24c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13023", "type": "seen", "source": "https://t.me/cvedetector/13906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13023 - PHPGurukul Maid Hiring Management System Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13023 \nPublished : Dec. 29, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability has been found in PHPGurukul Maid Hiring Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/search-maid.php of the component Search Maid Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T23:14:40.000000Z"}, {"uuid": "8ec626b4-b3f4-4671-9b20-bab0c89cf5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1302", "type": "seen", "source": "https://t.me/ctinow/205900", "content": "https://ift.tt/k6n8WAZ\nCVE-2024-1302", "creation_timestamp": "2024-03-12T17:32:09.000000Z"}, {"uuid": "05fd976a-9855-4bf4-b365-e9ad62e06dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13020", "type": "seen", "source": "https://t.me/cvedetector/13901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13020 - Code-Projects Chat System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13020 \nPublished : Dec. 29, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in code-projects Chat System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/chatroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T20:44:12.000000Z"}, {"uuid": "328d17be-084f-46b0-a435-dadf4c2d043d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13021", "type": "seen", "source": "Telegram/rD863MGFiYRiwms3FsHA0ss7rNY7gu3rRjwaSIeKSXPE0Nqq", "content": "", "creation_timestamp": "2025-02-06T02:39:08.000000Z"}, {"uuid": "e46cd807-d004-4f48-84c8-8b2eb7d199d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1302", "type": "seen", "source": "https://t.me/ctinow/205892", "content": "https://ift.tt/k6n8WAZ\nCVE-2024-1302", "creation_timestamp": "2024-03-12T17:32:00.000000Z"}]}