{"vulnerability": "cve-2024-1210", "sightings": [{"uuid": "e037a4e3-1a93-4d21-861d-3792444ddb45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "84e70aba-e67a-43d8-9622-741a3b607998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12105", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/694", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12105\n\ud83d\udd39 Description: In WhatsUp Gold versions released before 2024.0.2, an authenticated user can use a\u00a0specially crafted HTTP request that can lead to information disclosure.\n\ud83d\udccf Published: 2024-12-31T10:32:08.238Z\n\ud83d\udccf Modified: 2025-01-08T13:07:04.839Z\n\ud83d\udd17 References:\n1. https://www.progress.com/network-monitoring", "creation_timestamp": "2025-01-08T14:12:20.000000Z"}, {"uuid": "56502163-8af3-425d-93ce-e08c8410373f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12104", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2382", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12104\n\ud83d\udd39 Description: The Visual Website Collaboration, Feedback &amp; Project Management \u2013 Atarim plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpf_delete_file and wpf_delete_file functions in all versions up to, and including, 4.0.9. This makes it possible for unauthenticated attackers to delete project pages and files.\n\ud83d\udccf Published: 2025-01-21T09:21:10.182Z\n\ud83d\udccf Modified: 2025-01-21T09:21:10.182Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7d40c658-a156-470e-bf93-a1f2ccec9c61?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3225314%40atarim-visual-collaboration&amp;new=3225314%40atarim-visual-collaboration&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-21T10:01:18.000000Z"}, {"uuid": "db4696ec-fa21-4d77-bb52-ceee1ccb4b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12109", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8611", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12109\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Product Labels For Woocommerce (Sale Badges) WordPress plugin before 1.5.9 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks\n\ud83d\udccf Published: 2025-03-25T06:00:11.148Z\n\ud83d\udccf Modified: 2025-03-25T06:00:11.148Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2eca2f88-c843-4794-8cd9-46f17c92753a/", "creation_timestamp": "2025-03-25T06:23:49.000000Z"}, {"uuid": "a761eb07-64e6-4f65-b547-c5973f9d38be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://t.me/CyberBulletin/1891", "content": "\u26a1\ufe0fCVE-2024-12108 (CVSS 9.6) and Beyond: Progress Issues Critical Patch for WhatsUp Gold Network Monitoring Software.\n\n#CyberBulletin", "creation_timestamp": "2025-01-02T12:15:09.000000Z"}, {"uuid": "767e3e5e-32f5-481d-86a1-f86c4d78cda8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12107", "type": "seen", "source": "https://t.me/cvedetector/11973", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12107 - Double-Free Vulnerability in uD3TN BPv7 Caused by\", \n  \"Content\": \"CVE ID : CVE-2024-12107 \nPublished : Dec. 4, 2024, 11:15 a.m. | 1\u00a0hour, 8\u00a0minutes ago \nDescription : Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T13:24:26.000000Z"}, {"uuid": "6c1c7a8d-41ba-42c6-884a-cdcbb115f706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/bexsop/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-14T13:46:34.000000Z"}, {"uuid": "c2879076-86dc-4b31-af6d-5fd3d4209e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "Telegram/5wtuBUawfmBgpqWWV5EHlsYg0fOU3PzyjHe2qzgYk5w-", "content": "", "creation_timestamp": "2024-06-14T14:38:05.000000Z"}, {"uuid": "cbdb8876-2d21-4107-8537-d1496d73a2b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1122", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2025-03-05T14:04:07.000000Z"}, {"uuid": "8293a2d6-65c0-45eb-a3f2-95e64fd68990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "seen", "source": "https://t.me/arpsyndicate/3868", "content": "#ExploitObserverAlert\n\nPD/http/cves/2024/CVE-2024-1210\n\nDESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1210. The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via API. This makes it possible for unauthenticated attackers to obtain access to quizzes.", "creation_timestamp": "2024-02-21T21:20:53.000000Z"}, {"uuid": "e6d2975e-2b6d-42b8-aba7-545563432e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/12981", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-16T15:10:15.000000Z"}, {"uuid": "735b5b6e-98fd-4e85-b1e4-1cf42fa3a7e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/313", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-02-26T20:19:03.000000Z"}, {"uuid": "6b0a7140-c1c1-44cf-9670-66f8b952ee73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/324", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-03-22T20:01:24.000000Z"}, {"uuid": "b9833662-a7ed-4088-9984-c11e323b9501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1457", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:50.000000Z"}, {"uuid": "4be2a7aa-c9f8-4613-b7a4-41faeea53d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1380", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-02-23T22:03:27.000000Z"}, {"uuid": "bc005d91-4a0c-478b-a25d-e334138fac8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1397", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-03-19T16:05:55.000000Z"}, {"uuid": "a43822d4-95ab-4957-8653-12173dedcb97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1444", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:51.000000Z"}, {"uuid": "a5183648-3ee8-48d5-9274-30e202a117b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1425", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-27T16:50:04.000000Z"}, {"uuid": "7767a36d-296b-4606-88bd-ab7c25d6bf12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1404", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-03T19:16:45.000000Z"}, {"uuid": "4d4c1064-2ce2-4745-b7d6-71b6eff1f660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1625", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T11:01:27.000000Z"}, {"uuid": "473895dd-7333-4ec5-aa8d-319bb65c2690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1412", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-05-14T19:38:14.000000Z"}, {"uuid": "7088a72b-175b-443c-a29f-9bc57172e9ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "seen", "source": "https://t.me/ctinow/192896", "content": "https://ift.tt/wjrZVS0\nCVE-2024-1210 | LearnDash LMS Plugin up to 4.10.1 on WordPress API information disclosure", "creation_timestamp": "2024-02-25T14:46:19.000000Z"}, {"uuid": "d5d0b7aa-5cea-4d3f-ac2c-b35a179632dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12107", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113594201638912768", "content": "", "creation_timestamp": "2024-12-04T10:59:22.059858Z"}, {"uuid": "ccc247ac-2b82-48bf-af0e-ca95492dab7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12104", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgamo3ndzq27", "content": "", "creation_timestamp": "2025-01-21T10:15:31.165642Z"}, {"uuid": "8fb0f568-b90c-4c9b-a8e6-eb7036bf1dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12104", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113865629826391092", "content": "", "creation_timestamp": "2025-01-21T09:27:07.756840Z"}, {"uuid": "a4c620fc-16f5-4e02-8354-508ce4c5de95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12104", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgaoklnzwm2e", "content": "", "creation_timestamp": "2025-01-21T10:49:22.062051Z"}, {"uuid": "b3d47f86-cc0e-4a69-bba2-9f84b2d5dba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12102", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917671340731294", "content": "", "creation_timestamp": "2025-01-30T14:01:57.995792Z"}, {"uuid": "4916e592-079d-4420-98d3-43dc47728f3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12102", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxod732mn2j", "content": "", "creation_timestamp": "2025-01-30T14:16:27.297240Z"}, {"uuid": "6729c1a6-8f9c-4483-bc3a-a5d5151de6e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "Telegram/eU5TW0NrIabaH627FpFKhEBuxk5i4RkIq4T6rxIMq7cGCQ", "content": "", "creation_timestamp": "2025-03-05T22:29:05.000000Z"}, {"uuid": "e5225b74-e627-4815-a715-142faaf29498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12106", "type": "seen", "source": "https://t.me/cvedetector/14004", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12106 - SolarWinds WhatsUp Gold LDAP Configuration Remote Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12106 \nPublished : Dec. 31, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : In WhatsUp Gold versions released before 2024.0.2, an unauthenticated attacker can configure\u00a0LDAP settings. \nSeverity: 9.4 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T12:52:32.000000Z"}, {"uuid": "181f5cab-6394-461d-b067-c3e78e93c540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12105", "type": "seen", "source": "https://t.me/cvedetector/14003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12105 - \"WhatsUp Gold Information Disclosure Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12105 \nPublished : Dec. 31, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : In WhatsUp Gold versions released before 2024.0.2, an authenticated user can use a\u00a0specially crafted HTTP request that can lead to information disclosure. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T12:52:31.000000Z"}, {"uuid": "09a87db1-eb35-4b37-b23b-095adf6a6d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/42136", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-16T15:10:16.000000Z"}, {"uuid": "650cb21d-d11e-49d8-b13c-fb8b8122aafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12100", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706144897456986", "content": "", "creation_timestamp": "2024-12-24T05:28:00.687804Z"}, {"uuid": "f6ae0835-2e34-426b-899e-ccb545c98625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12100", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzs7tqf2l25", "content": "", "creation_timestamp": "2024-12-24T06:15:54.057222Z"}, {"uuid": "3be7ddb7-ebbd-4450-8456-4cb2f601d35f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707092038057937", "content": "", "creation_timestamp": "2024-12-24T09:28:53.162304Z"}, {"uuid": "9e94d16b-304a-40c4-990d-dd1c170e1e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le27mcmc6k2a", "content": "", "creation_timestamp": "2024-12-24T10:15:30.971631Z"}, {"uuid": "a4c7706e-9b1d-447b-b640-7d644c101afd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12104", "type": "seen", "source": "https://t.me/cvedetector/15913", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12104 - Atarim Visual Website Collaboration Unauthenticated File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12104 \nPublished : Jan. 21, 2025, 10:15 a.m. | 38\u00a0minutes ago \nDescription : The Visual Website Collaboration, Feedback &amp; Project Management \u2013 Atarim plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpf_delete_file and wpf_delete_file functions in all versions up to, and including, 4.0.9. This makes it possible for unauthenticated attackers to delete project pages and files. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T11:56:28.000000Z"}, {"uuid": "d820b4fb-81f2-4315-bedc-680ffefd353f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/4049", "content": "\u2620\ufe0fCVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\n\u2708\ufe0fEnjoy", "creation_timestamp": "2025-03-05T23:29:05.000000Z"}, {"uuid": "606c1c73-32fd-403d-b8ab-cbcc0633112f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12103", "type": "seen", "source": "https://t.me/cvedetector/13581", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12103 - WordPress Content No Cache Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12103 \nPublished : Dec. 24, 2024, 10:15 a.m. | 36\u00a0minutes ago \nDescription : The Content No Cache: prevent specific content from being cached plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.1.2 via the eos_dyn_get_content action due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T11:53:46.000000Z"}, {"uuid": "2e29cbf1-9fa4-4e38-aa0e-e61744548652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12100", "type": "seen", "source": "https://t.me/cvedetector/13568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12100 - Uncategorizedewing Reflected Cross-Site Scripting in Bitcoin Lightning Publisher for WordPress\", \n  \"Content\": \"CVE ID : CVE-2024-12100 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : The Bitcoin Lightning Publisher for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:48.000000Z"}, {"uuid": "b95348fd-c2ca-4829-85f7-def0968ccd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "seen", "source": "https://t.me/ctinow/185017", "content": "https://ift.tt/ySsvKGI\nCVE-2024-1210 Exploit", "creation_timestamp": "2024-02-14T21:16:33.000000Z"}, {"uuid": "92899e22-01ae-49cc-b608-e562e1649d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://t.me/CyberBulletin/26995", "content": "\u26a1\ufe0fCVE-2024-12108 (CVSS 9.6) and Beyond: Progress Issues Critical Patch for WhatsUp Gold Network Monitoring Software.\n\n#CyberBulletin", "creation_timestamp": "2025-01-02T12:15:09.000000Z"}, {"uuid": "9a445e7c-aaf5-4956-a382-cb224e40f9ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1210", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T22:32:26.000000Z"}, {"uuid": "49169091-f725-4cbe-a8ce-99649a874c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lep7dcoiok2r", "content": "", "creation_timestamp": "2025-01-01T18:36:33.958400Z"}, {"uuid": "139ef6eb-623d-4db6-97d8-7bc4a14bff62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3leq6wjtgk72x", "content": "", "creation_timestamp": "2025-01-02T04:01:55.215418Z"}, {"uuid": "19a4a309-d25e-4f0d-96f2-61da516fd031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3leqnx7glev2s", "content": "", "creation_timestamp": "2025-01-02T08:30:43.479868Z"}, {"uuid": "ec05cb70-259e-41bd-9c82-c37269b85cde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3ler2rb3otv2m", "content": "", "creation_timestamp": "2025-01-02T12:20:03.645971Z"}, {"uuid": "67ae41d2-5256-467f-8472-2ec7f7cc4360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12105", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113759492380346040", "content": "", "creation_timestamp": "2025-01-02T15:34:59.267570Z"}, {"uuid": "c04d79b1-536c-481e-b616-5fe57eaf5f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12106", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113759492380346040", "content": "", "creation_timestamp": "2025-01-02T15:34:59.306260Z"}, {"uuid": "1aea4c57-31b7-4f26-b089-80234bc234a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113759492380346040", "content": "", "creation_timestamp": "2025-01-02T15:34:59.331168Z"}, {"uuid": "a6a3c2a4-d827-497e-bde0-73092a112d50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lergut4g322m", "content": "", "creation_timestamp": "2025-01-02T15:56:47.618535Z"}, {"uuid": "3cc437be-b723-456b-ac52-e29ec1b0d7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12108", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3leswz6dllc2j", "content": "", "creation_timestamp": "2025-01-03T06:18:12.948285Z"}, {"uuid": "b47d3a4d-93c0-4822-a5b5-bbc3b181dd20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12108", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lf2bjz6afs2i", "content": "", "creation_timestamp": "2025-01-06T04:15:18.231327Z"}, {"uuid": "b0e79082-9eb1-4b4b-935e-b0bdb694f7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12106", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lf2bjz6afs2i", "content": "", "creation_timestamp": "2025-01-06T04:15:18.331010Z"}, {"uuid": "3b8b0126-694c-4dac-89d2-1d975b875e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12105", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lf2bjz6afs2i", "content": "", "creation_timestamp": "2025-01-06T04:15:18.409234Z"}]}