{"vulnerability": "CVE-2024-13079", "sightings": [{"uuid": "f8df2195-7d55-4ea0-b21a-f7eadef107f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13079", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113749118548440059", "content": "", "creation_timestamp": "2024-12-31T19:36:46.386731Z"}, {"uuid": "42406112-fc79-4fb6-b387-2efbb7380492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13079", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lemug2qbr225", "content": "", "creation_timestamp": "2024-12-31T20:15:45.879611Z"}, {"uuid": "95a20c07-e0ee-458e-bee3-7688b4227650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13079", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3gcrm44p2h", "content": "", "creation_timestamp": "2025-01-06T15:13:19.226469Z"}, {"uuid": "7efe6420-b59c-429a-a775-a1e14485e848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13079", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113782195423303538", "content": "", "creation_timestamp": "2025-01-06T15:48:42.448728Z"}, {"uuid": "f6c4af55-78b5-407b-8cd4-bade7f07518e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13079", "type": "seen", "source": "https://t.me/cvedetector/14059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13079 - PhpGurukul Land Record System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-13079 \nPublished : Dec. 31, 2024, 8:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Land Record System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/property-details.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T22:05:55.000000Z"}]}