{"vulnerability": "cve-2024-5703", "sightings": [{"uuid": "cbd77490-06cb-4959-8603-ea467379ca46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57030", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845467361093984", "content": "", "creation_timestamp": "2025-01-17T19:59:32.623235Z"}, {"uuid": "271a2923-bf1b-4bb8-b180-d8e664c779e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57030", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxmdv74gs2w", "content": "", "creation_timestamp": "2025-01-17T20:15:51.239521Z"}, {"uuid": "522dc2e8-a491-44db-b325-eeae26592658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57031", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxmdxjm3o2e", "content": "", "creation_timestamp": "2025-01-17T20:15:53.740473Z"}, {"uuid": "e79a6d78-91d1-4ff4-87ae-7ec92989cb47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57032", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxmdzxx5h2f", "content": "", "creation_timestamp": "2025-01-17T20:15:56.338577Z"}, {"uuid": "e610d179-6513-4fb1-969c-e33c6942fdda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845537573466684", "content": "", "creation_timestamp": "2025-01-17T20:17:24.049563Z"}, {"uuid": "520fb82d-5b70-46eb-a0f8-7b339247c5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845537590313066", "content": "", "creation_timestamp": "2025-01-17T20:17:24.368688Z"}, {"uuid": "8cb62c7b-1de4-4c51-81c6-d9ffc09bda64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845552194441254", "content": "", "creation_timestamp": "2025-01-17T20:21:07.239608Z"}, {"uuid": "19c3a56e-01ea-46b6-8702-b2f55bc5693e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845552210273560", "content": "", "creation_timestamp": "2025-01-17T20:21:07.439840Z"}, {"uuid": "25beba9f-bc8e-4763-a977-e04085073119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57030", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxnxfgiru2k", "content": "", "creation_timestamp": "2025-01-17T20:44:40.536789Z"}, {"uuid": "1b98e201-4308-4e21-9ef6-6d282e79ce0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57032", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxnxg5co62h", "content": "", "creation_timestamp": "2025-01-17T20:44:43.862137Z"}, {"uuid": "e620574d-f1dd-401e-941f-fb7295c2d6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57031", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxnxgipj42k", "content": "", "creation_timestamp": "2025-01-17T20:44:45.863900Z"}, {"uuid": "8ad4cf75-d512-441c-8d90-840f624d8df9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57034", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxnxglxti2r", "content": "", "creation_timestamp": "2025-01-17T20:44:46.423003Z"}, {"uuid": "5d1c5474-f54e-4bb7-8cb5-d542ec072d35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxpohw3ts2f", "content": "", "creation_timestamp": "2025-01-17T21:15:27.537106Z"}, {"uuid": "cb4107af-bd6c-4dcd-82c2-df140857e1d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxpokgzrt2c", "content": "", "creation_timestamp": "2025-01-17T21:15:30.246878Z"}, {"uuid": "849f5f4f-e14a-479d-9004-45b435256250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57030", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113845895479022844", "content": "", "creation_timestamp": "2025-01-17T21:48:25.382513Z"}, {"uuid": "af0dac04-1022-44cb-84b2-c6ba2972cae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxudgvpa22u", "content": "", "creation_timestamp": "2025-01-17T22:38:46.639309Z"}, {"uuid": "5c394331-4996-4d5f-9e0c-1b3e17e4613e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxuf7s6t42g", "content": "", "creation_timestamp": "2025-01-17T22:39:46.433280Z"}, {"uuid": "6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113867210977785280", "content": "", "creation_timestamp": "2025-01-21T16:09:14.122539Z"}, {"uuid": "6ca7d738-b18c-4662-9c7b-cac73d9ffcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbasokhwy2b", "content": "", "creation_timestamp": "2025-01-21T16:15:59.963739Z"}, {"uuid": "13d2a510-d882-4c45-92a6-de610fc1244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbcotdfpr2q", "content": "", "creation_timestamp": "2025-01-21T16:49:38.777527Z"}, {"uuid": "f2736181-179a-41b7-a69d-e55e2bca49c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2212", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57035\n\ud83d\udd39 Description: WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php.\n\ud83d\udccf Published: 2025-01-17T00:00:00\n\ud83d\udccf Modified: 2025-01-17T20:12:17.057205\n\ud83d\udd17 References:\n1. https://github.com/nilsonLazarin/WeGIA/issues/827\n2. https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57035", "creation_timestamp": "2025-01-17T20:57:58.000000Z"}, {"uuid": "0241967d-70b6-44f8-bb63-6f7f4046bd54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57034", "type": "seen", "source": "https://t.me/cvedetector/15727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57034 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57034 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &lt; 3.2.0 is vulnerable to SQL Injection in query_geracao_auto.php via the query parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:43.000000Z"}, {"uuid": "8c556ff6-5565-468b-84df-c0627b4fe57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://t.me/cvedetector/15748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57033 - WeGIA Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-57033 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA &lt; 3.2.0 is vulnerable to Cross Site Scripting (XSS) via the dados_addInfo parameter of documentos_funcionario.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:20.000000Z"}, {"uuid": "f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://t.me/cvedetector/15744", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57035 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57035 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:14.000000Z"}, {"uuid": "aa07b444-0e19-4f1c-97ba-a8f384396316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57032", "type": "seen", "source": "https://t.me/cvedetector/15736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57032 - WeGIA Password Change Insecure Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57032 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &lt; 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:57.000000Z"}, {"uuid": "f512465b-84ba-4848-9e1d-950f3cb91068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57030", "type": "seen", "source": "https://t.me/cvedetector/15734", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57030 - Wegia XSS in Documentos Funcionario\", \n  \"Content\": \"CVE ID : CVE-2024-57030 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : Wegia &lt; 3.2.0 is vulnerable to Cross Site Scripting (XSS) in /geral/documentos_funcionario.php via the id parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:52.000000Z"}, {"uuid": "0c82ed98-ffc7-453c-8a73-406482769de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57031", "type": "seen", "source": "https://t.me/cvedetector/15735", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57031 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57031 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &lt; 3.2.0 is vulnerable to SQL Injection in /funcionario/remuneracao.php via the id_funcionario parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:56.000000Z"}, {"uuid": "3c6495be-228e-483f-afc3-42cddd20873e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://t.me/cvedetector/15976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57036 - TOTOLINK A810R Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57036 \nPublished : Jan. 21, 2025, 4:15 p.m. | 25\u00a0minutes ago \nDescription : TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T17:48:28.000000Z"}, {"uuid": "f9996050-51b6-43ea-b674-439782cd3bde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5703", "type": "seen", "source": "https://t.me/cvedetector/1065", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5703 - Icegram Express WordPress Plugin API Unconfigured Capability Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5703 \nPublished : July 17, 2024, 8:15 a.m. | 21\u00a0minutes ago \nDescription : The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress &amp; WooCommerce plugin for WordPress is vulnerable to unauthorized API access due to a missing capability check in all versions up to, and including, 5.7.26. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access the API (provided it is enabled) and add, edit, and delete audience users. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T10:41:46.000000Z"}]}