{"vulnerability": "cve-2024-1219", "sightings": [{"uuid": "44f17634-64c5-4d64-ab72-2cf3382062dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12196", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113595787239641013", "content": "", "creation_timestamp": "2024-12-04T17:42:36.546509Z"}, {"uuid": "f523a307-953e-4969-a0d1-7504c575fd13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12197", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1708/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "91d130b3-b506-4563-adf9-357225b394ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12194", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1706/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "051c1d8f-78c6-4500-a43f-511dff78372d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12191", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1704/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "c4634d8b-212a-4340-aa8d-ff66f921092c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12198", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1709/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "6b020b24-aeb1-40cf-af35-a77cfed0966e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12192", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1705/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "f6b4cc5e-9a37-4795-8bcf-d666da7ded79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12191", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668896703171569", "content": "", "creation_timestamp": "2024-12-17T15:35:18.337434Z"}, {"uuid": "d5b378b6-4f5b-46bb-b853-b61105d273ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12192", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668896719374803", "content": "", "creation_timestamp": "2024-12-17T15:35:18.609311Z"}, {"uuid": "fb251917-1cd0-40ca-b3fc-2e0decd48b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12193", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668896734528295", "content": "", "creation_timestamp": "2024-12-17T15:35:18.823703Z"}, {"uuid": "823dc6f2-2f52-455e-9b55-95933125a9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12190", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113711319953815691", "content": "", "creation_timestamp": "2024-12-25T03:24:05.768362Z"}, {"uuid": "09a36111-33c9-444f-a152-442bef1fad73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12190", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le43xkgovn2c", "content": "", "creation_timestamp": "2024-12-25T04:15:33.110249Z"}, {"uuid": "5e41b0be-d885-4776-b548-7d0cc0be55b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12195", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113769844738584802", "content": "", "creation_timestamp": "2025-01-04T11:27:43.972106Z"}, {"uuid": "5e95961b-4ffc-41b0-9536-a01d6ded667c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lew3h6qn5v22", "content": "", "creation_timestamp": "2025-01-04T12:15:37.154752Z"}, {"uuid": "a3262be7-d4a1-4de5-ac7e-4b1474e661ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12195", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lew4x47xzh2u", "content": "", "creation_timestamp": "2025-01-04T12:42:26.074788Z"}, {"uuid": "fcfea4e1-c1b9-43e3-87a1-9fa195edabf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12195", "type": "seen", "source": "https://t.me/cvedetector/14277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12195 - WP Project Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12195 \nPublished : Jan. 4, 2025, 12:15 p.m. | 33\u00a0minutes ago \nDescription : The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to SQL Injection via the 'project_id' parameter of the /wp-json/pm/v2/projects/2/task-lists REST API endpoint in all versions up to, and including, 2.6.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, who have been granted access to a project, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T13:55:22.000000Z"}, {"uuid": "f6e9d9a7-8985-4e71-94aa-aca620dabee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12199", "type": "seen", "source": "https://t.me/cvedetector/13109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12199 - Autodesk Navisworks OOB Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12199 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:58.000000Z"}, {"uuid": "713ab490-ec90-42f8-81b8-e59505d74f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12198", "type": "seen", "source": "https://t.me/cvedetector/13108", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12198 - Autodesk Navisworks Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12198 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:54.000000Z"}, {"uuid": "07395487-63e0-472c-9c4d-088152bcfe29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12192", "type": "seen", "source": "https://t.me/cvedetector/13104", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12192 - Autodesk Navisworks Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12192 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:51.000000Z"}, {"uuid": "b2e1236f-71bd-4644-918a-789c633a7c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12191", "type": "seen", "source": "https://t.me/cvedetector/13103", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12191 - Autodesk Navisworks Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12191 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:47.000000Z"}, {"uuid": "9e422850-bee2-4a17-9114-adb68b908226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12197", "type": "seen", "source": "https://t.me/cvedetector/13107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12197 - Autodesk Navisworks Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12197 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:53.000000Z"}, {"uuid": "88f9a9eb-9fe0-4375-82d1-9fecc4e68626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12194", "type": "seen", "source": "https://t.me/cvedetector/13106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12194 - Autodesk Navisworks Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12194 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:53.000000Z"}, {"uuid": "4c00f6e2-c07a-4b02-b65d-f5740ed45f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12193", "type": "seen", "source": "https://t.me/cvedetector/13105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12193 - Autodesk Navisworks DWFX Out-of-Bounds Write Advisory\", \n  \"Content\": \"CVE ID : CVE-2024-12193 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:36:52.000000Z"}, {"uuid": "5d8bf5dc-4015-4d3b-bc31-6d2400ca4430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12198", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-113/", "content": "", "creation_timestamp": "2025-03-10T04:00:00.000000Z"}, {"uuid": "df575ea6-dee8-410d-8533-045d920169cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12193", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-112/", "content": "", "creation_timestamp": "2025-03-10T04:00:00.000000Z"}, {"uuid": "c60ef22b-ee5c-4aff-9b27-99ce9034169d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12190", "type": "seen", "source": "https://t.me/cvedetector/13611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12190 - Bit Form Contact Form Unauthenticated Data Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12190 \nPublished : Dec. 25, 2024, 4:15 a.m. | 38\u00a0minutes ago \nDescription : The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the bitform-form-entry-edit endpoint in all versions up to, and including,  2.17.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view all form submissions from other users. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T06:17:21.000000Z"}, {"uuid": "aabf780b-764f-4dfd-b570-7da73dcdb3a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12196", "type": "seen", "source": "https://t.me/cvedetector/12021", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12196 - Incorrect authorization in the permission componen\", \n  \"Content\": \"CVE ID : CVE-2024-12196 \nPublished : Dec. 4, 2024, 6:15 p.m. | 50\u00a0minutes ago \nDescription : Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T20:06:39.000000Z"}, {"uuid": "0a87b738-23e0-456e-bd64-a40f1f4d9352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12195", "type": "seen", "source": "Telegram/-j5O-Ldxcg1PiO-VCZsMHKCB7R5yUlpJrhJxmMhs4aqXKTSr", "content": "", "creation_timestamp": "2025-02-06T02:44:19.000000Z"}]}