{"vulnerability": "CVE-2024-3930", "sightings": [{"uuid": "442fd819-4b6e-4ce9-8b49-cd6d8f41245a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39304", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmifneicnl27", "content": "", "creation_timestamp": "2025-04-10T21:02:22.235853Z"}, {"uuid": "c30a7e15-3525-4e28-bc2f-cfbb0fa98477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39309", "type": "published-proof-of-concept", "source": "Telegram/H1xPKt116A0j7iBrvbv3wx9mwzOcT7vSSRK3e7GX6jVtUiE", "content": "", "creation_timestamp": "2025-10-08T03:00:06.000000Z"}, {"uuid": "2ae8f39a-b175-4dce-8b23-2522445c2c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39300", "type": "seen", "source": "https://t.me/cvedetector/4507", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39300 - WAB-I1750-PS Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-39300 \nPublished : Aug. 30, 2024, 7:15 a.m. | 31\u00a0minutes ago \nDescription : Missing authentication vulnerability exists in Telnet function of WAB-I1750-PS v1.5.10 and earlier. When Telnet function of the product is enabled, a remote attacker may login to the product without authentication and alter the product's settings. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T09:48:04.000000Z"}, {"uuid": "72d12ad4-4b66-4f79-9a57-6f12e9c9d9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39304", "type": "seen", "source": "https://t.me/cvedetector/1708", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39304 - ChurchCRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39304 \nPublished : July 26, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : ChurchCRM is an open-source church management system. Versions of the application prior to 5.9.2 are vulnerable to an authenticated SQL injection due to an improper sanitization of user input. Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to `/GetText.php`. Version 5.9.2 patches the issue. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-26T21:22:56.000000Z"}, {"uuid": "b6d41d6f-7ed7-4f13-83de-ca9c9c2ca697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3930", "type": "seen", "source": "https://t.me/cvedetector/2066", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3930 - Akana API Platform XXE Injection\", \n  \"Content\": \"CVE ID : CVE-2024-3930 \nPublished : July 30, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : In versions of Akana API Platform prior to 2024.1.0\u00a0a flaw resulting in XML External Entity (XXE) was discovered. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T22:26:13.000000Z"}, {"uuid": "64a637f6-d7f4-4eab-b0e8-b9f58f5206e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39308", "type": "seen", "source": "https://t.me/cvedetector/184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39308 - RailsAdmin is a Rails engine that provides an inte\", \n  \"Content\": \"CVE ID : CVE-2024-39308 \nPublished : July 8, 2024, 3:15 p.m. | 32\u00a0minutes ago \nDescription : RailsAdmin is a Rails engine that provides an interface for managing data. RailsAdmin list view has the XSS vulnerability, caused by improperly-escaped HTML title attribute. Upgrade to 3.1.3 or 2.2.2 (to be released). \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T17:50:20.000000Z"}]}