{"vulnerability": "cve-2024-1012", "sightings": [{"uuid": "dec5b76d-90e1-4d97-a796-2927c89a84bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10124", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113638194387723422", "content": "", "creation_timestamp": "2024-12-12T05:27:18.164006Z"}, {"uuid": "7fe183fc-0d57-4b95-8531-ceff810faf03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10124", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783262351603871", "content": "", "creation_timestamp": "2025-01-06T20:19:59.382427Z"}, {"uuid": "cab66c6a-50f3-46cf-8ec3-9920614b75bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-1012", "type": "seen", "source": "https://bsky.app/profile/intelrob.bsky.social/post/3lmawaau6vc2a", "content": "", "creation_timestamp": "2025-04-07T21:37:54.475866Z"}, {"uuid": "498d0628-bfbf-4cf9-b779-bb8a303d795f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10127", "type": "seen", "source": "https://t.me/cvedetector/11571", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10127 - M-Files LDAP Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10127 \nPublished : Nov. 20, 2024, 9:15 a.m. | 38\u00a0minutes ago \nDescription : Authentication bypass condition in LDAP authentication in M-Files server versions before 24.11 supported usage of OpenLDAP configurations that allowed user authentication without a password when the LDAP server itself had the vulnerable configuration. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T11:13:47.000000Z"}, {"uuid": "da0c3f95-1e1f-4035-8b39-96ff8df6f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1012", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18335", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1012\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Wanhu ezOFFICE 11.1.0. This issue affects some unknown processing of the file defaultroot/platform/bpm/work_flow/operate/wf_printnum.jsp. The manipulation of the argument recordId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252281 was assigned to this vulnerability.\n\ud83d\udccf Published: 2024-01-31T07:10:51.041Z\n\ud83d\udccf Modified: 2025-06-13T19:00:31.718Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.252281\n2. https://vuldb.com/?ctiid.252281\n3. https://github.com/4nNns/cveAdd/blob/b73e94ff089ae2201d9836b4d61b8175ff21618a/sqli/%E4%B8%87%E6%88%B7EZOFFICE%20%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md", "creation_timestamp": "2025-06-13T19:35:09.000000Z"}, {"uuid": "c360e4ea-e6a0-4db2-a180-494b9ac99607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10126", "type": "seen", "source": "https://t.me/cvedetector/11573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10126 - M-Files Server File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10126 \nPublished : Nov. 20, 2024, 9:15 a.m. | 38\u00a0minutes ago \nDescription : Local File Inclusion vulnerability in M-Files Server in versions before 24.11 (excluding 24.8 SR1, 24.2 SR3 and 23.8 SR7) allows an authenticated user to read server local files of a limited set of filetypes via document preview. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T11:13:49.000000Z"}, {"uuid": "1d7f503b-42ee-408b-a0cd-8cdf659facb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10125", "type": "seen", "source": "https://t.me/cvedetector/8589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10125 - Amazon Application LoadBalancer Untrusted JWT Signer IAM Identity\", \n  \"Content\": \"CVE ID : CVE-2024-10125 \nPublished : Oct. 22, 2024, 12:15 a.m. | 29\u00a0minutes ago \nDescription : The  Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo   contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any  ASP.NET   Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T02:54:44.000000Z"}, {"uuid": "f0334520-a243-4085-990e-715aeef13fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10129", "type": "seen", "source": "https://t.me/cvedetector/8345", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10129 - \"HFO4 Share Handler Remote SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10129 \nPublished : Oct. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in HFO4 shudong-share up to 2.4.7. This affects an unknown part of the file /includes/create_share.php of the component Share Handler. The manipulation of the argument fkey leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-19T01:16:39.000000Z"}, {"uuid": "3c87ed90-2202-46bc-8b16-f5b7d791c273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10122", "type": "seen", "source": "https://t.me/cvedetector/8341", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10122 - Topdata Inner Rep Plus WebServer Password Field Masking vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10122 \nPublished : Oct. 18, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been classified as problematic. Affected is an unknown function of the file /InnerRepPlus.html of the component Operator Details Form. The manipulation leads to missing password field masking. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T21:56:00.000000Z"}, {"uuid": "b7207a5d-c7b8-447b-baf5-28eed5d2135a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10120", "type": "seen", "source": "https://t.me/cvedetector/8335", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10120 - \"WFH45678 Radar Unrestricted File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10120 \nPublished : Oct. 18, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability affects unknown code of the file /services/v1/common/upload. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T20:15:45.000000Z"}, {"uuid": "1fa6e714-6080-4907-a898-6a8e4297db2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10128", "type": "seen", "source": "https://t.me/cvedetector/8343", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10128 - Topdata Inner Rep Plus WebServer Crypto Algorithm Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10128 \nPublished : Oct. 18, 2024, 9:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T23:36:17.000000Z"}, {"uuid": "ab2d2e76-5fa8-4b39-84fc-ccc92f4575ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10121", "type": "seen", "source": "https://t.me/cvedetector/8340", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10121 - Wfh45678 Radar Remote Interface Handler Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10121 \nPublished : Oct. 18, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T21:55:59.000000Z"}, {"uuid": "06956cf2-63a6-4300-ad6b-ec737ac78769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1012", "type": "seen", "source": "https://t.me/ctinow/176549", "content": "https://ift.tt/KnQ3ZrD\nCVE-2024-1012 | Wanhu ezOFFICE 11.1.0 wf_printnum.jsp recordId sql injection", "creation_timestamp": "2024-01-31T08:41:46.000000Z"}, {"uuid": "764dea2d-30ab-4186-b078-b8ff9f299c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1012", "type": "seen", "source": "https://t.me/ctinow/179579", "content": "https://ift.tt/0UmOw6A\nCVE-2024-1012 Exploit", "creation_timestamp": "2024-02-05T23:16:12.000000Z"}, {"uuid": "372a5ad2-47e5-4e33-9f6e-e5201eb1361b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1012", "type": "seen", "source": "https://t.me/ctinow/176583", "content": "https://ift.tt/VIiU8kD\nCVE-2024-1012", "creation_timestamp": "2024-01-31T09:32:19.000000Z"}]}