{"vulnerability": "CVE-2024-4472", "sightings": [{"uuid": "654737a9-e25a-4592-bf1d-a06b7a7f6dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44722", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhiujmxfmc2e", "content": "", "creation_timestamp": "2026-03-20T15:48:55.023252Z"}, {"uuid": "2cbb1f69-6476-4071-bec6-2e4d9afd72c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44728", "type": "seen", "source": "https://t.me/cvedetector/4932", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44728 - Sourcecodehero Event Management System Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-44728 \nPublished : Sept. 5, 2024, 5:15 p.m. | 26\u00a0minutes ago \nDescription : Sourcecodehero Event Management System 1.0 allows Stored Cross-Site Scripting via parameters Full Name, Address, Email, and contact# in /clientdetails/admin/regester.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T19:43:05.000000Z"}, {"uuid": "05caad12-6a8d-4c75-9aad-adca71554919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4472", "type": "seen", "source": "https://t.me/cvedetector/5510", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4472 - GitLab GraphQL Log Retention of Dependency Proxy Credentials Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-4472 \nPublished : Sept. 12, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T21:53:29.000000Z"}, {"uuid": "e42bd35f-359d-4a8d-b682-1b58cea2ea15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44727", "type": "seen", "source": "https://t.me/cvedetector/4931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44727 - Sourcecodehero Event Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-44727 \nPublished : Sept. 5, 2024, 5:15 p.m. | 26\u00a0minutes ago \nDescription : Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T19:43:04.000000Z"}, {"uuid": "b557f144-29a6-4b0c-8a84-49cb94ea5b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44721", "type": "seen", "source": "https://t.me/cvedetector/5114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44721 - SeaCMS Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-44721 \nPublished : Sept. 9, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : SeaCMS v13.1 was discovered to a Server-Side Request Forgery (SSRF) via the url parameter at /admin_reslib.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T18:59:48.000000Z"}, {"uuid": "ef4c84d7-e00e-4bc8-bfa2-b44e59a8cc1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44725", "type": "seen", "source": "https://t.me/cvedetector/5127", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44725 - AutoCMS SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44725 \nPublished : Sept. 9, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : AutoCMS v5.4 was discovered to contain a SQL injection vulnerability via the sidebar parameter at /admin/robot.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T23:10:31.000000Z"}, {"uuid": "28fe4e4e-cf6d-42f5-801e-77370c7f9070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44720", "type": "seen", "source": "https://t.me/cvedetector/5113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44720 - SeaCMS PHP File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44720 \nPublished : Sept. 9, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : SeaCMS v13.1 was discovered to an arbitrary file read vulnerability via the component admin_safe.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T18:59:47.000000Z"}, {"uuid": "0aad55f6-b1aa-4dd8-a1eb-b2385a5831f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44724", "type": "seen", "source": "https://t.me/cvedetector/5130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44724 - AutoCMS PHP Code Injection\", \n  \"Content\": \"CVE ID : CVE-2024-44724 \nPublished : Sept. 9, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : AutoCMS v5.4 was discovered to contain a PHP code injection vulnerability via the txtsite_url parameter at /admin/site_add.php. This vulnerability allows attackers to execute arbitrary PHP code via injecting a crafted value. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T23:10:33.000000Z"}]}