{"vulnerability": "CVE-2024-12103", "sightings": [{"uuid": "606c1c73-32fd-403d-b8ab-cbcc0633112f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://t.me/cvedetector/13581", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12103 - WordPress Content No Cache Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12103 \nPublished : Dec. 24, 2024, 10:15 a.m. | 36\u00a0minutes ago \nDescription : The Content No Cache: prevent specific content from being cached plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.1.2 via the eos_dyn_get_content action due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T11:53:46.000000Z"}, {"uuid": "3be7ddb7-ebbd-4450-8456-4cb2f601d35f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707092038057937", "content": "", "creation_timestamp": "2024-12-24T09:28:53.162304Z"}, {"uuid": "9e94d16b-304a-40c4-990d-dd1c170e1e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le27mcmc6k2a", "content": "", "creation_timestamp": "2024-12-24T10:15:30.971631Z"}]}