{"vulnerability": "CVE-2024-4294", "sightings": [{"uuid": "89e1ebce-895b-4e4b-bd57-c78bdb6261cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4294", "type": "seen", "source": "https://t.me/kasraone_com/697", "content": "\ud83d\udd34CVE\n\n\n\n      CVE-2024-4294\n\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u060c \u06a9\u0647 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062d\u0631\u0627\u0646\u06cc \u0637\u0628\u0642\u0647\u200c\u0628\u0646\u062f\u06cc \u0634\u062f\u0647 \u0628\u0648\u062f\u060c \u062f\u0631 PHPGurukul Doctor \n\nAppointment Management System 1.0\n\n \u06cc\u0627\u0641\u062a \u0634\u062f. \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0628\u0631\u062e\u06cc \u0627\u0632\n\n \u0639\u0645\u0644\u06a9\u0631\u062f\u0647\u0627\u06cc \u0646\u0627\u0634\u0646\u0627\u062e\u062a\u0647 \u0641\u0627\u06cc\u0644\n /doctor/view-appointment-detail.php \u0627\u0633\u062a. \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0622\u0631\u06af\u0648\u0645\u0627\u0646 editid \u0645\u0646\u062c\u0631 \u0628\u0647 \u06a9\u0646\u062a\u0631\u0644\n \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0634\u0646\u0627\u0633\u0647 \u0647\u0627\u06cc \u0645\u0646\u0628\u0639 \u0645\u06cc \u0634\u0648\u062f. \u062d\u0645\u0644\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0646\u062c\u0627\u0645 \u0634\u0648\u062f. \u0627\u06cc\u0646 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0628\u0631\u0627\u06cc \u0639\u0645\u0648\u0645 \u0641\u0627\u0634 \u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f. \nVDB-262226\n\n \u0634\u0646\u0627\u0633\u0647 \u0627\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062e\u062a\u0635\u0627\u0635 \u062f\u0627\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-05-14T16:09:19.000000Z"}, {"uuid": "fe2fa6ca-7414-4d82-b82e-0079c836564b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42947", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7415", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42947\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in the handler function in /goform/telnet of Tenda FH1201 v1.2.0.14 (408) allows attackers to execute arbitrary commands via a crafted HTTP request.\n\ud83d\udccf Published: 2024-08-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T13:36:53.179Z\n\ud83d\udd17 References:\n1. https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/telnet.md", "creation_timestamp": "2025-03-13T13:45:08.000000Z"}]}