{"vulnerability": "CVE-2024-5472", "sightings": [{"uuid": "80292bb7-8e55-47f0-b58c-f8fc8423d0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54724", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800125994752892", "content": "", "creation_timestamp": "2025-01-09T19:48:39.108527Z"}, {"uuid": "cd9ae7a6-8052-4a57-b612-52e4b6c33652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54724", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdip3ta3722", "content": "", "creation_timestamp": "2025-01-09T20:17:17.454872Z"}, {"uuid": "4f1b07d7-339d-44e9-a17e-0019448d0723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgr32bk2jg2e", "content": "", "creation_timestamp": "2025-01-27T23:15:28.162822Z"}, {"uuid": "de21bf82-e1f1-4cf3-a333-f5c9a9cc3c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902657768295570", "content": "", "creation_timestamp": "2025-01-27T22:23:49.099525Z"}, {"uuid": "df3b9452-a007-428e-8ce8-3cad50aac1a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "2dab086e-9d51-4b49-abc0-fb766db05697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "confirmed", "source": "https://gist.github.com/xu-yanbo202000460009/00dacd7bfede713a0f052a531da4fabd", "content": "", "creation_timestamp": "2025-01-26T15:54:39.000000Z"}, {"uuid": "8b9406b6-aacf-47e8-9e3e-b441e979c951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "https://t.me/cvedetector/16551", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54728 - BYD QIN PLUS DM-i Dilink OS Access Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54728 \nPublished : Jan. 27, 2025, 11:15 p.m. | 1\u00a0hour, 45\u00a0minutes ago \nDescription : Incorrect access control in BYD QIN PLUS DM-i Dilink OS 3.0_13.1.7.2204050.1 allows unauthorized attackers to access system logcat logs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T02:04:09.000000Z"}, {"uuid": "f8100220-970d-4be0-a555-955ab8e67ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "https://vulnerability.circl.lu/comment/21f63dda-f998-4c51-b7ce-6efc09015c56", "content": "", "creation_timestamp": "2025-01-26T17:57:50.934368Z"}, {"uuid": "dc8fe7f9-4542-43c3-9836-1c89867c4e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54724", "type": "seen", "source": "https://t.me/cvedetector/14908", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54724 - PHPYun Backdoor File Write and Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54724 \nPublished : Jan. 9, 2025, 8:15 p.m. | 38\u00a0minutes ago \nDescription : PHPYun before 7.0.2 is vulnerable to code execution through backdoor-restricted arbitrary file writing and file inclusion. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:57:27.000000Z"}, {"uuid": "aebd49fb-31ba-4e2b-b291-77a6bb9aae4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54728", "type": "seen", "source": "Telegram/YqJ7Bqdmww9sQ6uT25RVXlkJmrTvrMG3qHBSbOnUGIMyQPRX", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "f74d5d1c-b646-4661-94fa-b20293bb1439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5472", "type": "seen", "source": "https://t.me/cvedetector/799", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5472 - The WP QuickLaTeX WordPress plugin before 3.8.7 do\", \n  \"Content\": \"CVE ID : CVE-2024-5472 \nPublished : July 13, 2024, 6:15 a.m. | 32\u00a0minutes ago \nDescription : The WP QuickLaTeX WordPress plugin before 3.8.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-13T08:49:35.000000Z"}]}