{"vulnerability": "CVE-2024-1306", "sightings": [{"uuid": "a397bd01-e774-41fd-be8e-f8b3ea9dbef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13067", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113746644001441615", "content": "", "creation_timestamp": "2024-12-31T09:07:28.047748Z"}, {"uuid": "20754c74-84fb-4fe4-95a0-3a5cf9f31b82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13061", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113747157856589140", "content": "", "creation_timestamp": "2024-12-31T11:18:08.840390Z"}, {"uuid": "32e4aa80-653b-4a43-8ae9-744bdacdc14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-6360c159-b674e73894b2931a", "content": "", "creation_timestamp": "2025-01-07T10:37:14.946743Z"}, {"uuid": "f6900a34-62ae-448d-9dbe-4dd37c87a2be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758017148068621", "content": "", "creation_timestamp": "2025-01-02T09:19:48.385422Z"}, {"uuid": "105d995c-2613-41e8-8f4a-aad1879b74a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758032036152453", "content": "", "creation_timestamp": "2025-01-02T09:23:35.496790Z"}, {"uuid": "6e436ef8-1b04-43c7-a1fa-8f0f5c3d0bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqvcv67yp2y", "content": "", "creation_timestamp": "2025-01-02T10:42:32.379861Z"}, {"uuid": "668ccd98-7e93-40f2-ab96-70faf2cad702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lespfct4fc27", "content": "", "creation_timestamp": "2025-01-03T04:01:50.083486Z"}, {"uuid": "e46dd521-3dee-4bfa-95e4-090df2c42998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3less57l3n22w", "content": "", "creation_timestamp": "2025-01-03T04:51:01.260617Z"}, {"uuid": "c85baedb-080e-4b4c-8166-8b5d36ee0a15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-13062", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3leswxtg7dk2j", "content": "", "creation_timestamp": "2025-01-03T06:17:27.918100Z"}, {"uuid": "9f6528d9-d4b5-474f-b81e-3617d1e337af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3letf3uq72y2q", "content": "", "creation_timestamp": "2025-01-03T10:30:15.902668Z"}, {"uuid": "c0968348-0372-4895-85f3-d139b3dfab3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3letozqo5u42j", "content": "", "creation_timestamp": "2025-01-03T13:28:02.190744Z"}, {"uuid": "6dd6c121-8aa7-4f93-9c39-24000fc5a010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://t.me/cybersecplayground/13", "content": "CVE-2024-12912&amp;CVE-2024-13062 \n:Injection and execution vulnerabilities in certain ASUS router firmware series.\n\ud83d\udcca 1.2m+ Services are found on hunter.how yearly.\n\ud83d\udd17Hunter Link: hunter.how/list?searchVal\u2026\n\ud83d\udc47Query\nHUNTER :/product.name=\"ASUS AiCloud\"\nFOFA : product=\"ASUS-AiCloud\"\nSHODAN : product:\"ASUS AiCloud\"\n\ud83d\udcf0Refer:securityonline.info/cve-2024-12912\u2026\nasus.com/content/asus-p\u2026\n#ASUS #hunterhow #infosec #infosecurity #OSINT #Vulnerability", "creation_timestamp": "2025-07-19T19:48:50.000000Z"}, {"uuid": "32c5aec4-665d-42cd-a70d-a59b000a35b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13060", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8219", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13060\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability in AnythingLLM Docker version 1.3.1 allows users with 'Default' permission to access other users' profile pictures by changing the 'id' parameter in the user cookie. This issue is present in versions prior to 1.3.1.\n\ud83d\udccf Published: 2025-03-20T10:08:46.465Z\n\ud83d\udccf Modified: 2025-03-20T14:31:59.970Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/98a49c90-e095-441f-900c-59d463dc8e8f\n2. https://github.com/mintplex-labs/anything-llm/commit/696af19c45473172ad4d3ca749281800a4d1a45a", "creation_timestamp": "2025-03-20T15:18:36.000000Z"}, {"uuid": "a5843572-1627-4fad-b26a-985d319dfb56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ln6cgc3cp225", "content": "", "creation_timestamp": "2025-04-19T14:03:14.929979Z"}, {"uuid": "56debc94-5b6b-45f1-81d8-cb2d614b88dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13067", "type": "seen", "source": "https://t.me/cvedetector/13973", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13067 - CodeAstro Online Food Ordering System Remote File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13067 \nPublished : Dec. 31, 2024, 9:15 a.m. | 34\u00a0minutes ago \nDescription : A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T11:11:44.000000Z"}, {"uuid": "269c9147-dc5d-4d20-b852-cb37ad76caa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://t.me/CyberBulletin/1930", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:34:25.000000Z"}, {"uuid": "8703f91e-cda0-41e8-af0c-0d025a3ccabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://t.me/cvedetector/14113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13062 - ASUS Router Unauthenticated Remote Command Execution vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13062 \nPublished : Jan. 2, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : An unintended entry point vulnerability has been identified in certain router models, which may allow for arbitrary command execution.  \nRefer to the '\u00a001/02/2025 ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T11:44:27.000000Z"}, {"uuid": "1cef841a-dba9-4f5c-a175-d1e6fd53f839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13061", "type": "seen", "source": "https://t.me/cvedetector/14005", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13061 - \"2100 Technology Electronic Official Document Management System Authentication Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-13061 \nPublished : Dec. 31, 2024, 12:15 p.m. | 18\u00a0minutes ago \nDescription : The Electronic Official Document Management System from 2100 Technology has an Authentication Bypass vulnerability. Although the product enforces an IP whitelist for the API used to query user tokens, unauthenticated remote attackers can still deceive the server to obtain tokens of arbitrary users, which can then be used to log into the system. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T13:42:40.000000Z"}, {"uuid": "957207f5-1270-484d-86a7-d8cd82e3efbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://t.me/GrayHatsHack/9343", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-06T06:33:13.000000Z"}, {"uuid": "eb0eb789-8b38-46fa-a0c1-56510ed3890b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "Telegram/bFbvvsWFrdQ5h-XjTeMTF5qtVAXiD5xqM9z_pQQSq8_xqlI", "content": "", "creation_timestamp": "2025-01-07T21:30:05.000000Z"}, {"uuid": "d0999f7c-5773-4d7c-885b-cc46f69315ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13062", "type": "seen", "source": "https://t.me/CyberBulletin/27034", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:34:25.000000Z"}]}