{"vulnerability": "CVE-2024-4032", "sightings": [{"uuid": "a212f04f-494d-4acf-b2b2-a335fc2e6422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-4032", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "c48e4891-320e-46b3-bc2a-2089c3103ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40324", "type": "seen", "source": "https://t.me/cvedetector/1643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40324 - E-Staff CRLF Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40324 \nPublished : July 25, 2024, 8:15 p.m. | 28\u00a0minutes ago \nDescription : A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T22:46:14.000000Z"}, {"uuid": "8f1081dc-2e6a-431c-8f5b-d9ebc046009c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40329", "type": "seen", "source": "https://t.me/cvedetector/543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40329 - idccms v1.35 was discovered to contain a Cross-Sit\", \n  \"Content\": \"CVE ID : CVE-2024-40329 \nPublished : July 10, 2024, 1:15 p.m. | 39\u00a0minutes ago \nDescription : idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/softBak_deal.php?mudi=backup \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T15:56:59.000000Z"}, {"uuid": "664daa18-5dd4-46e3-8db6-e54f6f52ddce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40328", "type": "seen", "source": "https://t.me/cvedetector/538", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40328 - idccms v1.35 was discovered to contain a Cross-Sit\", \n  \"Content\": \"CVE ID : CVE-2024-40328 \nPublished : July 10, 2024, 1:15 p.m. | 39\u00a0minutes ago \nDescription : idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/memberOnline_deal.php?mudi=del&amp;dataType=&amp;dataID=6 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T15:56:52.000000Z"}, {"uuid": "6cc5044d-0158-4670-b43c-709d0f46dde9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40322", "type": "seen", "source": "https://t.me/cvedetector/973", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40322 - JFinalCMS SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-40322 \nPublished : July 16, 2024, 4:15 p.m. | 26\u00a0minutes ago \nDescription : An issue was discovered in JFinalCMS v.5.0.0. There is a SQL injection vulnerablity via /admin/div_data/data \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T18:47:46.000000Z"}]}