{"vulnerability": "CVE-2024-7954", "sightings": [{"uuid": "8531ff0b-4a17-4852-8196-66fbae51415f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-06)", "content": "", "creation_timestamp": "2025-02-06T00:00:00.000000Z"}, {"uuid": "d7099728-9e4d-459f-a8ad-795b1f56c105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "9f918733-b5a7-44d5-829a-0c608339914c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "06f7938f-151b-4339-986d-9d4e93eb32db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "fff10228-d320-49b2-8a22-2c4298d10f96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-08)", "content": "", "creation_timestamp": "2025-02-08T00:00:00.000000Z"}, {"uuid": "95ed1a04-32a3-46bb-bfcb-57a3f1fdb40b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "2d4ed0ba-fc8c-4d3b-a2cd-11d74589041d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}, {"uuid": "f0fb4868-8b58-49b7-8d81-cb660b429b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "697a13d4-01f9-4425-ad39-c0b1cb00a001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "1393e566-12a5-4e4e-9e0b-f70c71a30e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-06)", "content": "", "creation_timestamp": "2025-03-06T00:00:00.000000Z"}, {"uuid": "ede85aec-8e78-4183-93ce-cbe3f797f855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "42f42a79-626b-4e91-a315-2282970302a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "96743c5f-5473-45b2-97a9-d36c37043abb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "50a5e81b-1306-4441-8f8e-36498d33d1f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "bc504e21-dcfa-476e-8548-4e41217c7931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "d0a0e7e2-7601-4348-96c2-9e18c0aff177", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "8d571946-4af0-46eb-b5c6-61dd00d4eb9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m6wgsk5tke26", "content": "", "creation_timestamp": "2025-12-01T12:33:51.596639Z"}, {"uuid": "982f5d65-2f20-457a-8323-fb91e56035fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "58938ed3-5b91-400e-891e-bb83c1104851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "0841c1ad-8812-4e63-bfe9-5c836000a77f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "60468847-cf9d-422e-8242-f9831c0dc9bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "39a18d33-6845-42e2-a024-ea56d6895948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "30f64567-b30a-496f-8354-db0f2995f861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "53a1da9d-275a-45d2-9765-c007ce447a80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb", "content": "", "creation_timestamp": "2024-08-21T13:15:03.000000Z"}, {"uuid": "42758d4a-ab1d-41a1-a9a6-794503ce2872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "ad8f0fec-517a-4903-9055-1b459f927076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "42af2518-4538-424f-b666-0555e2a7f166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "7dd68fa6-60de-4605-8ab1-9a64bfe8cdb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "79ad2fc0-3400-4318-bee4-3c613851cd4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-19)", "content": "", "creation_timestamp": "2026-04-19T00:00:00.000000Z"}, {"uuid": "bf6531f2-5832-41e0-9f17-e57ca8377d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "2937ace1-ac1e-4f88-9cf1-34cbedade494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "8834c4e0-8083-4cc3-bd59-367410376f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "Telegram/0R1sh6yT_M6RpS889fQ8OVezlutCC6wifTf5dIyVUqSNUZo", "content": "", "creation_timestamp": "2025-12-11T21:00:06.000000Z"}, {"uuid": "cec432d3-0fae-44c5-b233-2eca29c45273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "bc7884ff-0ee0-488d-a51b-66091239880d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-14)", "content": "", "creation_timestamp": "2026-04-14T00:00:00.000000Z"}, {"uuid": "3daa705e-8e02-4fee-aa41-8af9b3874a8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9622", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.\nURL\uff1ahttps://github.com/0dayan0n/RCE_CVE-2024-7954-\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-28T01:07:38.000000Z"}, {"uuid": "b283db82-5096-48e8-9523-f9f8b26524bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "Telegram/x4NhPEjclFZBTJ5YSraKIOMw9ZvHs8TQNlnJu4joqcwfGCg", "content": "", "creation_timestamp": "2025-07-08T11:00:09.000000Z"}, {"uuid": "0f57ec70-2afd-4e8b-b6df-4ed6a68304b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/17624", "content": "PoC CVE-2024-7954: Remote Code Execution (RCE) in \"SPIP\"\n\nCredit: youtube.com/@ghost_sec", "creation_timestamp": "2025-05-28T18:14:37.000000Z"}, {"uuid": "5d7ec707-3b8d-4d08-879a-df20af9e51fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3464", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692", "creation_timestamp": "2024-09-09T05:10:50.000000Z"}, {"uuid": "d60760f8-f9b9-4047-b1a3-562cec2fe149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "Telegram/WfSL87aFXNnSDuSS1YvDbp1BNo-uID7DpjKufoi-oHFXVw", "content": "", "creation_timestamp": "2024-09-08T11:18:54.000000Z"}, {"uuid": "14bf9ff9-1103-441f-a813-c38508f2a050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/661", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692", "creation_timestamp": "2024-09-09T05:10:50.000000Z"}, {"uuid": "703ee2ac-e3ec-4e29-9f82-f61613c62e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "Telegram/MHs756x5KXyFgDJujxozx-cRKYu4EUG5GJymD5_Ezqi1O6yD", "content": "", "creation_timestamp": "2024-09-08T11:18:44.000000Z"}, {"uuid": "30a5cedd-e005-45b7-bad9-d408de20fb4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "https://t.me/cvedetector/4034", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7954 - SPIP Porte_plume Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-7954 \nPublished : Aug. 23, 2024, 6:15 p.m. | 40\u00a0minutes ago \nDescription : The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-23T21:19:06.000000Z"}, {"uuid": "1732bb6f-8ee8-45cd-95cd-8a0916828f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/305", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-09T14:48:44.000000Z"}, {"uuid": "b0210b84-f7ab-474d-8917-d2b624db57b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/298", "content": "CVE-2024-7954\n\nPOST /index.php?action=porte_plume_previsu HTTP/1.1\nHost: {{Hostname}}\nContent-Type: application/x-www-form-urlencoded\n\ndata=AA_[-&gt;URL]_BB\n\ncat /etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-08T15:35:43.000000Z"}, {"uuid": "7b3e64b6-c7fe-4e95-ae8b-4f8c6b9c81cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18504", "content": "CVE-2024-7954\n\nPOST /index.php?action=porte_plume_previsu HTTP/1.1\nHost: {{Hostname}}\nContent-Type: application/x-www-form-urlencoded\n\ndata=AA_[-&gt;URL]_BB\n\ncat /etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-08T13:32:08.000000Z"}, {"uuid": "d472867a-df4f-4400-85a4-b785a3089e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1934", "content": "CVE-2024-7954\n\nPOST /index.php?action=porte_plume_previsu HTTP/1.1\nHost: {{Hostname}}\nContent-Type: application/x-www-form-urlencoded\n\ndata=AA_[-&gt;URL]_BB\n\ncat /etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-08T11:06:23.000000Z"}, {"uuid": "646d22c6-5195-4884-bfa9-87bff2327e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15366", "content": "\u200aCritical Vulnerabilities in porte_plume plugin to Remote Exploits -$$$$ Bounty -CVE-2024\u20137954\n\nhttps://infosecwriteups.com/critical-vulnerabilities-in-porte-plume-plugin-to-remote-exploits-bounty-cve-2024-7954-3dbee45134ac?source=rss----7b722bfd1b8d---4", "creation_timestamp": "2024-10-08T03:27:19.000000Z"}, {"uuid": "4119d481-1e3a-4c33-805a-c7fe5b989792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15312", "content": "Critical Vulnerabilities in porte_plume plugin to Remote Exploits -$$$$ Bounty -CVE-2024\u20137954: https://infosecwriteups.com/critical-vulnerabilities-in-porte-plume-plugin-to-remote-exploits-bounty-cve-2024-7954-3dbee45134ac?source=rss------bug_bounty-5", "creation_timestamp": "2024-10-07T12:24:57.000000Z"}, {"uuid": "394b8995-8dbe-4d1e-a603-b9951131c619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/791", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-09T14:49:02.000000Z"}, {"uuid": "f5d3fe88-7992-49e7-b14e-d222045f7dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3135", "content": "CVE-2024-7954\n\nPOST /index.php?action=porte_plume_previsu HTTP/1.1\nHost: {{Hostname}}\nContent-Type: application/x-www-form-urlencoded\n\ndata=AA_[-&gt;URL]_BB\n\ncat /etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-09-08T15:35:21.000000Z"}, {"uuid": "bfe6fa68-7c17-4bd5-a9ca-7fff1d2e47f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11102", "content": "#exploit\n1. CVE-2024-7954:\nUnauth RCE in SPIP\nhttps://github.com/Chocapikk/CVE-2024-7954\n\n2. CVE-2024-0692:\nSolarWinds Security Event Manager AMF deserialization RCE\nhttps://exp10it.io/2024/03/solarwinds-security-event-manager-amf-deserialization-rce-cve-2024-0692\n\n3. CVE-2024-24759:\nBypass SSRF Protection with DNS Rebinding\nhttps://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", "creation_timestamp": "2024-09-12T12:57:45.000000Z"}, {"uuid": "b971c72b-5500-4fbc-9541-d2e29b70eb13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7954", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-07)", "content": "", "creation_timestamp": "2026-05-07T00:00:00.000000Z"}]}