{"vulnerability": "cve-2024-5083", "sightings": [{"uuid": "d7931024-7f36-4d15-bcee-a316e56b616f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50835", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482288052389768", "content": "", "creation_timestamp": "2024-11-14T16:38:16.283695Z"}, {"uuid": "0b966b9f-502f-46ef-9cb0-620384c3c07c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50836", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482288067985040", "content": "", "creation_timestamp": "2024-11-14T16:38:16.483893Z"}, {"uuid": "12454530-d353-4559-b509-9278a2805636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50834", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482329229276406", "content": "", "creation_timestamp": "2024-11-14T16:48:44.520654Z"}, {"uuid": "7f9eb391-fa7e-4efc-a625-876fe81c4152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50838", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113481884950886444", "content": "", "creation_timestamp": "2024-11-14T14:55:45.320654Z"}, {"uuid": "54d5be34-1b76-4382-9499-5d1fdf484030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50830", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482443221905840", "content": "", "creation_timestamp": "2024-11-14T17:17:43.964205Z"}, {"uuid": "8fd9d605-8b2e-445a-b03e-944fc8e3eb4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50831", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482443237542239", "content": "", "creation_timestamp": "2024-11-14T17:17:44.116055Z"}, {"uuid": "9647b3f3-2318-49eb-b8fc-0511025a0167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50837", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113481919699228585", "content": "", "creation_timestamp": "2024-11-14T15:04:35.487357Z"}, {"uuid": "99a707a4-3828-4d63-b2b4-298a547ea70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5083", "type": "seen", "source": "https://github.blog/security/vulnerability-research/attacks-on-maven-proxy-repositories/", "content": "", "creation_timestamp": "2025-01-22T17:00:51.000000Z"}, {"uuid": "aaf2721d-eb05-4416-b3ff-029694be5ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5083", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lxkxf7ppu525", "content": "", "creation_timestamp": "2025-08-29T21:02:25.149024Z"}, {"uuid": "0b0f1edd-60b2-46ba-9d61-2910d9678bac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5083", "type": "published-proof-of-concept", "source": "Telegram/6epx-3BQxTrkqZ6l5w7-X1UnDFzfHf3_J-HeEcKgNnF31DA", "content": "", "creation_timestamp": "2025-08-27T21:00:04.000000Z"}, {"uuid": "421fea06-174b-4b2e-95f3-c22f90a3f301", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50835", "type": "seen", "source": "https://t.me/cvedetector/10975", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50835 - KASHIPARA E-learning Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50835 \nPublished : Nov. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/edit_student.php in KASHIPARA E-learning Management System Project 1.0 via the cys, un, ln, fn, and id parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T19:10:16.000000Z"}, {"uuid": "3d6e6692-b74c-4010-a09e-3153ed630c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50831", "type": "seen", "source": "https://t.me/cvedetector/10996", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50831 - \"Kashipara E-Learning SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-50831 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A SQL Injection was found in /admin/admin_user.php in kashipara E-learning Management System Project 1.0 via the username and password parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:50.000000Z"}, {"uuid": "864f39f9-a248-4bd6-be90-83870cc02aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50836", "type": "seen", "source": "https://t.me/cvedetector/10974", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50836 - KASHIPARA E-learning Management System XSS\", \n  \"Content\": \"CVE ID : CVE-2024-50836 \nPublished : Nov. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and lastname parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T19:10:15.000000Z"}, {"uuid": "bbf69078-b40b-4c79-aa79-269f3aea7af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50833", "type": "seen", "source": "https://t.me/cvedetector/10979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50833 - KASHIPARA E-learning Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50833 \nPublished : Nov. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /login.php in KASHIPARA E-learning Management System Project 1.0 via the username and password parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T19:10:22.000000Z"}, {"uuid": "0f5f3de9-6720-4e0a-810f-ae622d095264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50830", "type": "seen", "source": "https://t.me/cvedetector/10995", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50830 - Kashipara E-learning Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50830 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/calendar_of_events.php in kashipara E-learning Management System Project 1.0 via the date_start, date_end, and title parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:49.000000Z"}, {"uuid": "ed1a8c4b-1dc8-4a54-a4ed-37d849695baf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50832", "type": "seen", "source": "https://t.me/cvedetector/10978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50832 - Kashipara E-learning Management System Project SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50832 \nPublished : Nov. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /admin/edit_class.php in kashipara E-learning Management System Project 1.0 via the class_name parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T19:10:21.000000Z"}, {"uuid": "712afdca-9b36-4ae9-971f-6acd69f339d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50834", "type": "seen", "source": "https://t.me/cvedetector/10973", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50834 - KASHIPARA E-learning Management System Project SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50834 \nPublished : Nov. 14, 2024, 5:15 p.m. | 38\u00a0minutes ago \nDescription : A SQL Injection was found in /admin/teachers.php in KASHIPARA E-learning Management System Project 1.0 via the firstname and lastname parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T19:10:14.000000Z"}, {"uuid": "80efc0c2-ff91-43c9-8bc2-6e5a4274b1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50837", "type": "seen", "source": "https://t.me/cvedetector/10963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50837 - KASHIPARA E-learning Management System Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50837 \nPublished : Nov. 14, 2024, 3:15 p.m. | 19\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was found in /lms/admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and username parameters in a POST HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T16:39:39.000000Z"}, {"uuid": "e1eed7a4-1fed-4dc7-8466-7c8ef95568be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50838", "type": "seen", "source": "https://t.me/cvedetector/10960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50838 - KASHIPARA E-learning Management System Project Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50838 \nPublished : Nov. 14, 2024, 3:15 p.m. | 19\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was found in /lms/admin/department.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the d and pi parameters in a POST HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T16:39:36.000000Z"}, {"uuid": "0e5b3630-864e-4de1-918b-be585ae0c490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50839", "type": "seen", "source": "https://t.me/cvedetector/10953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50839 - KASHIPARA E-learning Management System Vulnerability: Stored XSS in Administrator Subject Addition\", \n  \"Content\": \"CVE ID : CVE-2024-50839 \nPublished : Nov. 14, 2024, 2:15 p.m. | 28\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was found in /lms/admin/add_subject.php page in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the subject_code and title parameters in a POST HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T15:49:20.000000Z"}, {"uuid": "10da6b64-39c5-4601-b2c6-55c817ac0b5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5083", "type": "seen", "source": "https://t.me/cvedetector/10903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5083 - Sonatype Nexus Repository Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5083 \nPublished : Nov. 14, 2024, 2:15 a.m. | 38\u00a0minutes ago \nDescription : A stored\u00a0Cross-site Scripting vulnerability has been discovered in Sonatype Nexus Repository 2  \n  \nThis issue affects Nexus Repository 2 OSS/Pro versions up to and including 2.15.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T04:06:41.000000Z"}]}