{"vulnerability": "CVE-2024-1261", "sightings": [{"uuid": "ece2ab9b-3826-47cc-84d3-07198d338982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12614", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfu46oydey2h", "content": "", "creation_timestamp": "2025-01-16T10:48:38.462204Z"}, {"uuid": "0763378a-0c50-40a2-8d85-c6ed95680e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12616", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckhsyxwr2k", "content": "", "creation_timestamp": "2025-01-09T11:16:21.044357Z"}, {"uuid": "edd34112-203e-4e81-a0dd-3230a6f172c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12618", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckhvdpp72l", "content": "", "creation_timestamp": "2025-01-09T11:16:24.211474Z"}, {"uuid": "79314f57-c0b6-4171-bbf9-9f0e1becdff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12613", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfu2dvfhao2s", "content": "", "creation_timestamp": "2025-01-16T10:15:45.050240Z"}, {"uuid": "6240d782-dbdd-4496-a26b-d8c051e8209e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12614", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfu2dykdqr2f", "content": "", "creation_timestamp": "2025-01-16T10:15:48.456289Z"}, {"uuid": "81c86348-9d5b-44ee-b6cb-85b0a8b5cb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12615", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfu2e3bgpm2r", "content": "", "creation_timestamp": "2025-01-16T10:15:51.121202Z"}, {"uuid": "9a73ade0-6f07-4970-9425-2ce14e202797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12610", "type": "seen", "source": "Telegram/8T3g4-CudyMPGqqrIVDcENYo9hxbslaZunVwdvyKzWc05ws3", "content": "", "creation_timestamp": "2025-03-08T04:34:56.000000Z"}, {"uuid": "c1d10dac-b7e1-456e-892c-9e12d3728bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12614", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1930", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12614\n\ud83d\udd39 Description: The Passwords Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pms_save_setting' and 'post_new_pass' AJAX actions in all versions up to, and including, 1.4.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings and add passwords.\n\ud83d\udccf Published: 2025-01-16T09:39:14.567Z\n\ud83d\udccf Modified: 2025-01-16T09:39:14.567Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/898c5554-fd02-47a2-a1f9-1c488cfab57e?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-settings-ajax-action.php\n3. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php", "creation_timestamp": "2025-01-16T09:55:32.000000Z"}, {"uuid": "d5fd737d-aebe-4b8f-9f68-0476a86c016e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12619", "type": "seen", "source": "https://t.me/cvedetector/21410", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12619 - GitLab CE/EE Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12619 \nPublished : March 28, 2025, 10:15 a.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1, allowing internal users to gain unauthorized access to internal projects. \nSeverity: 5.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T13:34:10.000000Z"}, {"uuid": "13ecf6b8-80c5-4a2a-a116-ba1416f4db9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12613", "type": "seen", "source": "https://t.me/cvedetector/15579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12613 - \"WordPress Passwords Manager SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12613 \nPublished : Jan. 16, 2025, 10:15 a.m. | 42\u00a0minutes ago \nDescription : The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb-&gt;prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T12:03:19.000000Z"}, {"uuid": "8269c82d-8d7c-4a2a-9bb3-3530fb9d4236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12615", "type": "seen", "source": "https://t.me/cvedetector/15576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12615 - Wordpress Passwords Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12615 \nPublished : Jan. 16, 2025, 10:15 a.m. | 42\u00a0minutes ago \nDescription : The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb-&gt;prefix value in several AJAX actions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T12:03:13.000000Z"}, {"uuid": "579547f5-b570-48e3-96e6-ed25c8f7a274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12614", "type": "seen", "source": "https://t.me/cvedetector/15575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12614 - WordPress Passwords Manager Invalid Capability Check Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12614 \nPublished : Jan. 16, 2025, 10:15 a.m. | 42\u00a0minutes ago \nDescription : The Passwords Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pms_save_setting' and 'post_new_pass' AJAX actions in all versions up to, and including, 1.4.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings and add passwords. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T12:03:12.000000Z"}, {"uuid": "1455be8e-e45d-4d8d-a6eb-d2f8e60a3ef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1261", "type": "seen", "source": "https://t.me/ctinow/197394", "content": "https://ift.tt/zs73fNx\nCVE-2024-1261 | Juanpao JPShop up to 1.5.02 API ComboController.php actionIndex pic_url unrestricted upload", "creation_timestamp": "2024-03-01T08:41:25.000000Z"}, {"uuid": "d0025929-010d-48e0-8f29-724a66185875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12617", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113705931190547781", "content": "", "creation_timestamp": "2024-12-24T04:33:39.653305Z"}, {"uuid": "d5340fbe-1909-4d37-8d1f-2db54f2d965e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12617", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113705944402586236", "content": "", "creation_timestamp": "2024-12-24T04:37:01.387361Z"}, {"uuid": "1df50d88-e61d-466c-a5f0-ba1c4601172a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12617", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzotsa7zg22", "content": "", "creation_timestamp": "2024-12-24T05:15:28.685237Z"}, {"uuid": "69d90931-bdc7-4f6c-9eab-44680c8e4299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12613", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfu46mwo5b2u", "content": "", "creation_timestamp": "2025-01-16T10:48:35.706290Z"}, {"uuid": "248160b0-38d2-47c5-accc-b74ebde047ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12616", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798400377674801", "content": "", "creation_timestamp": "2025-01-09T12:29:47.405436Z"}, {"uuid": "c4553801-8eba-434a-a31f-7dcb6a66403f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12618", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798400410997715", "content": "", "creation_timestamp": "2025-01-09T12:29:48.065484Z"}, {"uuid": "e0d01bd1-ea49-4a80-8bf0-0b2093984b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12615", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1929", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12615\n\ud83d\udd39 Description: The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb-&gt;prefix value in several AJAX actions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-16T09:39:15.003Z\n\ud83d\udccf Modified: 2025-01-16T09:39:15.003Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8397d5-6637-4faa-be1f-9cf52c25be9b?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php\n3. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/admin-page/addon/csv-export/index.php\n4. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-categories-ajax-action.php", "creation_timestamp": "2025-01-16T09:55:31.000000Z"}, {"uuid": "cfd678bb-fb72-49bb-9cd3-c93acb414a46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12613", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12613\n\ud83d\udd39 Description: The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb-&gt;prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-16T09:39:15.443Z\n\ud83d\udccf Modified: 2025-01-16T09:39:15.443Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/dec38992-a69f-4ccd-a23b-4dd1639897c3?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php", "creation_timestamp": "2025-01-16T09:55:31.000000Z"}, {"uuid": "b28a4c72-cb11-4c98-94c8-721b315f7c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12610", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6813", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12610\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The School Management System for Wordpress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new' AJAX actions in all versions up to, and including, 93.0.0. This makes it possible for unauthenticated attackers to delete arbitrary posts.\n\ud83d\udccf Published: 2025-03-07T08:21:26.362Z\n\ud83d\udccf Modified: 2025-03-07T08:21:26.362Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/9c3a7ca0-9325-4b50-a844-8eeb4047de1a?source=cve\n2. https://codecanyon.net/item/school-management-system-for-wordpress/11470032", "creation_timestamp": "2025-03-07T08:34:58.000000Z"}, {"uuid": "fcddc9ec-f56f-48e3-8df7-793d8adfb4e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12611", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6818", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12611\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-03-07T08:21:24.356Z\n\ud83d\udccf Modified: 2025-03-07T08:21:24.356Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/45ada7a4-466b-4e73-8869-e1178e4fc67a?source=cve\n2. https://codecanyon.net/item/school-management-system-for-wordpress/11470032", "creation_timestamp": "2025-03-07T08:35:05.000000Z"}, {"uuid": "22093b60-87ff-448f-9407-eb53ea696661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12619", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12619\n\ud83d\udd25 CVSS Score: 5.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N)\n\ud83d\udd39 Description: An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1, allowing internal users to gain unauthorized access to internal projects.\n\ud83d\udccf Published: 2025-03-28T10:02:13.406Z\n\ud83d\udccf Modified: 2025-03-28T10:02:13.406Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/509324\n2. https://hackerone.com/reports/2888260", "creation_timestamp": "2025-03-28T10:28:09.000000Z"}, {"uuid": "b7ff8a4d-03d6-4a5b-a456-9a2b559e84bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12616", "type": "seen", "source": "https://t.me/cvedetector/14838", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12616 - Bitly WordPress Plugin Unauthenticated Data Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12616 \nPublished : Jan. 9, 2025, 11:15 a.m. | 22\u00a0minutes ago \nDescription : The Bitly's WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 2.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and retrieve plugin settings. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T12:44:50.000000Z"}, {"uuid": "456e4368-8c1a-4034-8da2-cdf2997c7e84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12618", "type": "seen", "source": "https://t.me/cvedetector/14830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12618 - Newsletter2Go WordPress Plugin unauthorized DOI to reset styles Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-12618 \nPublished : Jan. 9, 2025, 11:15 a.m. | 22\u00a0minutes ago \nDescription : The Newsletter2Go plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'resetStyles' AJAX action in all versions up to, and including, 4.0.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset styles. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T12:44:38.000000Z"}, {"uuid": "cfd5c5df-a34e-4058-8194-9c2bfa532fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12617", "type": "seen", "source": "https://t.me/cvedetector/13554", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12617 - WordPress Omnibus WC Price History Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12617 \nPublished : Dec. 24, 2024, 5:15 a.m. | 35\u00a0minutes ago \nDescription : The WC Price History for Omnibus plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX actions in all versions up to, and including, 2.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view and modify history data. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T06:52:26.000000Z"}, {"uuid": "73a553a5-94d8-4190-8da2-4c92f9caddb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12613", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113837386603776560", "content": "", "creation_timestamp": "2025-01-16T09:44:30.209558Z"}, {"uuid": "41184437-b185-4008-84bd-5c728221e3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12615", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113837386632522187", "content": "", "creation_timestamp": "2025-01-16T09:44:30.630125Z"}, {"uuid": "d6bdeee9-7c7d-47d5-bdc2-48048a8e6a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12614", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113837386618371588", "content": "", "creation_timestamp": "2025-01-16T09:44:30.794281Z"}, {"uuid": "97afbe47-181a-48e3-99c5-751576d69df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12610", "type": "seen", "source": "https://t.me/cvedetector/19819", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12610 - \"WordPress School Management System Unauthenticated Post Deletion Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12610 \nPublished : March 7, 2025, 9:15 a.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : The School Management System for Wordpress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new' AJAX actions in all versions up to, and including, 93.0.0. This makes it possible for unauthenticated attackers to delete arbitrary posts. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T12:25:59.000000Z"}, {"uuid": "535437d8-c1bd-4096-b49f-3d0d4689bdfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12611", "type": "seen", "source": "https://t.me/cvedetector/19818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12611 - WordPress School Management System Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12611 \nPublished : March 7, 2025, 9:15 a.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T12:25:58.000000Z"}, {"uuid": "4458dfdc-1430-4aa8-bf08-d911cb6c250f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12616", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/932", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12616\n\ud83d\udd39 Description: The Bitly's WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 2.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and retrieve plugin settings.\n\ud83d\udccf Published: 2025-01-09T11:11:03.339Z\n\ud83d\udccf Modified: 2025-01-09T11:11:03.339Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/b1312c34-45c6-41e5-b6fc-a45ac2c8a0ca?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-auth.php#L115", "creation_timestamp": "2025-01-09T12:15:46.000000Z"}, {"uuid": "d9787aa5-ff03-4c02-b703-c8096769c450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1261", "type": "seen", "source": "https://t.me/ctinow/180403", "content": "https://ift.tt/SmvHTDK\nCVE-2024-1261", "creation_timestamp": "2024-02-06T23:31:34.000000Z"}]}