{"vulnerability": "CVE-2024-6670", "sightings": [{"uuid": "d7aa7ab4-69f4-415e-bb63-726e04a9355d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-09-20T18:10:03.000000Z"}, {"uuid": "a810eb14-5209-413b-b746-f3717f6813cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "b320adac-6f90-441a-8051-4ac6958b74f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "4daff622-bb48-4b55-86a2-f5870cfbc1f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "10f873b4-6e91-4128-9942-e89aad3e9ed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:59.000000Z"}, {"uuid": "2f6b4868-267f-4221-868d-b1a64c4b1363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "1172ef5a-11b5-4972-9037-68d437229fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "81562bac-c0e8-464a-ae48-a2295cfbdc02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "0129c907-28a1-4222-b379-3bf602cb4553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "e41f606d-a9c8-408e-bd5c-7aa8732d9f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/whatsup_gold_sqli.rb", "content": "", "creation_timestamp": "2024-09-26T21:27:04.000000Z"}, {"uuid": "a4ea8861-8c10-4608-ae9b-ed41128d570c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "36a56841-4514-4816-b47c-6806c1d74df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "0bc4189f-7451-4e52-b6a5-5e00bccee3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "c3a12768-6182-4559-85c8-1a1234e027aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "7abd77b9-a524-4469-9ced-260241f00938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "8504f636-7803-4a0d-a014-2150f08dc770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "49a07014-aaa5-4165-8433-1788e0863ece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13581", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Breaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold\nCVE-2024-6670.\n\nhttps://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/", "creation_timestamp": "2024-09-02T18:56:57.000000Z"}, {"uuid": "7216584c-f699-4068-b853-dfeab36d5823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/46dcdbb6-3332-45a4-9e0f-0d166483c857", "content": "", "creation_timestamp": "2026-02-02T12:26:28.990634Z"}, {"uuid": "438836ea-f493-47bd-8f5f-e64dfdc2a38c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-14)", "content": "", "creation_timestamp": "2026-04-14T00:00:00.000000Z"}, {"uuid": "adc0b019-f5d5-4523-b5ba-5623f79f7db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "https://bsky.app/profile/threatchain.bsky.social/post/3mkb46fzeip2s", "content": "", "creation_timestamp": "2026-04-24T18:00:03.903178Z"}, {"uuid": "42856f73-237a-4301-bfc3-0d1fdb05ad92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "https://bsky.app/profile/threatchain.bsky.social/post/3mkb46hgykw2s", "content": "", "creation_timestamp": "2026-04-24T18:00:05.166313Z"}, {"uuid": "eb704e00-c36f-4c07-bbcb-2393f9e5c84a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1883", "content": "https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/\n\nBreaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold\nCVE-2024-6670\n#\u5206\u6790", "creation_timestamp": "2024-09-01T00:52:21.000000Z"}, {"uuid": "064c8286-f87b-4095-a775-3abdcbd0cf80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18315", "content": "https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/\n\nBreaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold\nCVE-2024-6670\n#\u5206\u6790", "creation_timestamp": "2024-09-01T16:43:19.000000Z"}, {"uuid": "4db86256-82d2-4761-abff-29db8135e71c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "seen", "source": "https://t.me/cvedetector/4481", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6670 - SolarWinds WhatsUp Gold SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-6670 \nPublished : Aug. 29, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : In WhatsUp Gold versions released before 2024.0.0,\u00a0a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T01:25:57.000000Z"}, {"uuid": "550eba09-6c8e-4040-b2b4-debb48a49211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12383", "content": "\u200aProof-of-Concept Exploit Released for WhatsUp Gold Authentication Bypass (CVE-2024-6670)\n\nhttps://securityonline.info/proof-of-concept-exploit-released-for-whatsup-gold-authentication-bypass-cve-2024-6670/", "creation_timestamp": "2024-09-08T17:47:08.000000Z"}, {"uuid": "67e046e6-124d-4e69-a4c4-c792d645467c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/238", "content": "CVE-2024-6670 WhatsUp Gold\n*\n\u0421\u0442\u0430\u0442\u044c\u044f Exploiting Pre-Auth SQL Injection in WhatsUp Gold\n*\nPOC exploit", "creation_timestamp": "2024-08-30T22:36:55.000000Z"}, {"uuid": "69900338-4cf3-40ec-83b2-b068e7684abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "Telegram/RoJOASUAT7x49nZpxrcgbc0z3AsXJ43ePodyUpzTL9sQ6w", "content": "", "creation_timestamp": "2024-09-13T15:22:17.000000Z"}, {"uuid": "a442da01-0388-4f17-a7f3-da5df3c29a55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3396", "content": "Exploiting Pre-Auth SQL Injection In WhatsUp Gold\nCVE-2024-6670\n\nI discovered an unauthenticated SQL injection against the latest version of progress whatsup gold and turned it into a authentication bypass, after that the product by design allows you to achieve RCE (that part is up to you), lets talk about how this was possible\n\nPOC: https://github.com/sinsinology/CVE-2024-6670", "creation_timestamp": "2024-09-17T13:29:26.000000Z"}, {"uuid": "6574fe6f-14da-4e19-a638-003686ea3e00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "Telegram/J51TBLI_qDDfUdde13aP_PP1XSlzsxDAR6FmMmDmB27KGvM", "content": "", "creation_timestamp": "2024-09-27T18:49:57.000000Z"}, {"uuid": "53d2d663-8fb1-46af-b247-667877e69075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11136", "content": "\u200aCritical Vulnerabilities Uncovered in Progress WhatsUp Gold (CVE-2024-6670 &amp; CVE-2024-6671)\n\nhttps://securityonline.info/critical-vulnerabilities-uncovered-in-progress-whatsup-gold-cve-2024-6670-cve-2024-6671/", "creation_timestamp": "2024-08-24T09:50:28.000000Z"}, {"uuid": "a87135ee-0468-4c88-8d37-e11ddb6de3a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/20294", "content": "The Hacker News\nProgress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw\n\nMalicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks.\nThe activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of the Summoning Team, who", "creation_timestamp": "2024-09-13T15:22:18.000000Z"}, {"uuid": "9978158f-3056-4e44-ad4e-1120f3fb3652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/791", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:40:40.000000Z"}, {"uuid": "aa1d2dea-3d55-4ffd-9248-a9f8604d7274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "https://t.me/thehackernews/5577", "content": "\u26a0\ufe0f Cybercriminals are exploiting PoC exploits for two critical vulnerabilities (CVE-2024-6670, CVE-2024-6671) in WhatsUp Gold, with attacks starting just 5 hours after the PoC release. \n \nDetails here: https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html \n \nPatch your systems NOW to avoid becoming a target!", "creation_timestamp": "2024-09-13T13:06:50.000000Z"}, {"uuid": "9c279a8a-e2c8-44ac-a645-8dfe5e28209d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "https://t.me/KomunitiSiber/2566", "content": "Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw\nhttps://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html\n\nMalicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks.\nThe activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of the Summoning Team, who", "creation_timestamp": "2024-09-13T15:24:42.000000Z"}, {"uuid": "fdd9d2f1-46d9-42c7-acfd-70bcb87d388c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23609", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:41:03.000000Z"}, {"uuid": "c0735e13-c66e-463e-9d76-17317916e358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7359", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:49:11.000000Z"}, {"uuid": "c4e106e0-2f48-4c08-8766-b2cff2bfee20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "Telegram/cKm0A_LiobX1aJHDz1pOXFXm6goRz5V_ldF-99M_FH8HdA", "content": "", "creation_timestamp": "2024-09-13T19:29:12.000000Z"}, {"uuid": "4464d044-b258-45bc-8d7a-3ae8d9a16f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/4109", "content": "The Hacker News\nProgress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw\n\nMalicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks.\nThe activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of the Summoning Team, who", "creation_timestamp": "2024-09-13T15:22:18.000000Z"}, {"uuid": "6f01bb84-8f9b-4641-9218-86a9340f7251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8687", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:49:11.000000Z"}, {"uuid": "0dc035e5-9a79-4536-9d24-e2485a87ea53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3700", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:40:50.000000Z"}, {"uuid": "250766a1-a6db-4464-9a4e-59a57066f8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2254", "content": "CVE-2024-6670 WhatsUp Gold\n*\n\u0421\u0442\u0430\u0442\u044c\u044f Exploiting Pre-Auth SQL Injection in WhatsUp Gold\n*\nPOC exploit", "creation_timestamp": "2024-08-30T20:28:51.000000Z"}, {"uuid": "0718f448-3788-4ea9-a080-ea63f393d0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3093", "content": "https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/\n\nBreaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold\nCVE-2024-6670\n#\u5206\u6790", "creation_timestamp": "2024-09-01T06:09:11.000000Z"}, {"uuid": "478439d8-2c9b-4b45-b844-233dcd7db3c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/fattahh_ir/2726", "content": "https://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670/\n\nBreaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold\nCVE-2024-6670\n#\u5206\u6790", "creation_timestamp": "2024-09-01T00:57:54.000000Z"}, {"uuid": "d67e17ee-d0a3-486c-b6bc-bafc8f8e4112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11061", "content": "#exploit\n1. CVE-2024-6670:\nBreaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold\nhttps://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670\n\n2. CVE-2024-22263:\nSpring Cloud Dataflow Arbitrary File Writing Scanner\nhttps://github.com/securelayer7/CVE-2024-22263_Scanner", "creation_timestamp": "2024-10-02T10:55:23.000000Z"}, {"uuid": "391c5c46-fcd2-408c-89dc-6596ec437fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/132", "content": "Tools  - Hackers Factory \n\nCallander is a simple system sandboxing tool for Linux.\n\nhttps://github.com/rpetrich/callander\n\nToolkit for Retrieval and Analysis of Cyber Evidence (TRACE)\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/Gadzhovski/TRACE-Forensic-Toolkit\n\nhttps://github.com/xElessaway/My-OSINT-CTF\n\nInformation about web3 security and programming tutorials/tools \n\nhttps://github.com/immunefi-team/Web3-Security-Library?tab=readme-ov-file#starting-guides\n\nThis repository is meant to catalog network and host artifacts associated with various EDR products \"shell\" and response functionalities. \n\nhttps://github.com/cbecks2/edr-artifacts\n\nPoC for Progress Software WhatsUp Gold HasErrors SQL Injection Authentication Bypass Vulnerability (CVE-2024-6670)\n\nhttps://github.com/sinsinology/CVE-2024-6670\n\nAmnezia VPN Client (Desktop+Mobile) \n\nhttps://github.com/amnezia-vpn/amnezia-client\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-02T09:41:03.000000Z"}, {"uuid": "04649c76-33da-41b5-8d60-da46e23d0dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6670", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4320", "content": "#exploit\n1. Breaking Down Barriers: Exploiting Pre-Auth SQL Injection in WhatsUp Gold\nhttps://summoning.team/blog/progress-whatsup-gold-sqli-cve-2024-6670\n\n2. CVE-2024-22263:\nSpring Cloud Dataflow Arbitrary File Writing Scanner\nhttps://github.com/securelayer7/CVE-2024-22263_Scanner", "creation_timestamp": "2024-09-01T04:26:06.000000Z"}]}