{"vulnerability": "CVE-2024-5098", "sightings": [{"uuid": "9e5077d7-d46d-4d34-a24f-bbecc4fb20bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113464913774418226", "content": "", "creation_timestamp": "2024-11-11T14:59:45.707273Z"}, {"uuid": "63bb255c-84eb-4f85-9045-7484cb15c773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489233363805293", "content": "", "creation_timestamp": "2024-11-15T22:04:35.061682Z"}, {"uuid": "f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487607732298095", "content": "", "creation_timestamp": "2024-11-15T15:11:08.179102Z"}, {"uuid": "c666aa8a-11bc-4b77-9615-ddfb61f8de66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://t.me/cvedetector/10504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50989 - PHPGurukul Online Marriage Registration System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50989 \nPublished : Nov. 11, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : A SQL injection vulnerability in /omrs/admin/search.php in PHPGurukul Online Marriage Registration System v1.0 allows an attacker to execute arbitrary SQL commands via the \"searchdata \" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T16:56:27.000000Z"}, {"uuid": "2012335d-bf92-444a-9943-32dda8adf323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://t.me/cvedetector/11082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50986 - Clementine DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50986 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:42.000000Z"}, {"uuid": "f6cd8105-e65e-4951-871a-e93db02b9d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://t.me/cvedetector/11193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50983 - FlightPath Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50983 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:09:57.000000Z"}, {"uuid": "b49a82ee-dc21-42a5-823d-caee5dcc6648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6954", "content": "\ud83d\udea8CVE-2024-50986: DLL Hijacking Exploit for Clementine\n\nhttps://darkwebinformer.com/cve-20224-50986-dll-hijacking-exploit-for-clementine/", "creation_timestamp": "2024-11-13T19:01:51.000000Z"}, {"uuid": "42124092-234a-412b-98f3-a55f1d6a53bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5098", "type": "seen", "source": "Telegram/adWKqEhktE073DV6Xb7jwfur5hssPmsbmwtUdNDQrWL2xdK5", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}]}