{"vulnerability": "cve-2024-1301", "sightings": [{"uuid": "826f4fe5-429d-4c60-a246-2991646420d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://t.me/cvedetector/17596", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13011 - \"Apache WP Foodbakery Remote Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13011 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : The WP Foodbakery plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'upload_publisher_profile_image' function in versions up to, and including, 4.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:46.000000Z"}, {"uuid": "f7a72dc8-0760-43d1-b4d3-bbce4f80b934", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13010", "type": "seen", "source": "https://t.me/cvedetector/17595", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13010 - WordPress Foodbakery Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13010 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : The WP Foodbakery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on the 'search_type' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:46.000000Z"}, {"uuid": "bbf79e4d-478a-4f62-9f3e-45e406542682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13018", "type": "seen", "source": "Telegram/XOTBbBOGt4neERDfUctnCU3a8ZI_wxvbcy25_ZTrMkmun2vG", "content": "", "creation_timestamp": "2025-02-18T21:11:33.000000Z"}, {"uuid": "fc0e8adc-b845-4809-af6a-95f096ef4ecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13013", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113736380737379887", "content": "", "creation_timestamp": "2024-12-29T13:37:22.927030Z"}, {"uuid": "2b174458-0191-4b37-884f-186c6b8f3258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13013", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leh7dokfdh2a", "content": "", "creation_timestamp": "2024-12-29T14:15:18.363773Z"}, {"uuid": "97f8cd78-007f-48fa-a8aa-7f441d473017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13014", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113736726872132085", "content": "", "creation_timestamp": "2024-12-29T15:05:24.746758Z"}, {"uuid": "d0b8283f-9ead-4ac8-ad44-3ebcb8d763be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13014", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehcpakzvo25", "content": "", "creation_timestamp": "2024-12-29T15:15:27.879968Z"}, {"uuid": "3aadcd06-bbdd-45be-bb94-ed58fd3ab16b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13015", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113736854040364156", "content": "", "creation_timestamp": "2024-12-29T15:37:44.990420Z"}, {"uuid": "e9123ce4-407d-4064-b991-a47007e9cbd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13016", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113736977496301643", "content": "", "creation_timestamp": "2024-12-29T16:09:08.795250Z"}, {"uuid": "5c539244-6ac1-4c39-94b7-857e3130cd57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13015", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehg2efbp522", "content": "", "creation_timestamp": "2024-12-29T16:15:22.038077Z"}, {"uuid": "3d6c1bad-7743-4f5e-bfd4-3d495a913d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13016", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehg2gj3yd2c", "content": "", "creation_timestamp": "2024-12-29T16:15:25.530707Z"}, {"uuid": "fb5c114b-4d32-43ec-856e-caca5ab3431f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13017", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehjfphgsp25", "content": "", "creation_timestamp": "2024-12-29T17:15:24.078675Z"}, {"uuid": "8975d7cc-869d-45d0-86a3-286b9c8901fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13018", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113737425678406803", "content": "", "creation_timestamp": "2024-12-29T18:03:07.444859Z"}, {"uuid": "72d8b54e-78b9-42e4-bfe2-cf9655e0c82c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13018", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehmrca2kn25", "content": "", "creation_timestamp": "2024-12-29T18:15:34.143532Z"}, {"uuid": "f56add5e-3795-4134-b65c-03b908e97a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13019", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113737548497911439", "content": "", "creation_timestamp": "2024-12-29T18:34:21.599603Z"}, {"uuid": "dbfda113-e5b0-4cef-920b-9c2f876a3db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13019", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lehq4exrnr22", "content": "", "creation_timestamp": "2024-12-29T19:15:27.378193Z"}, {"uuid": "b2b33409-09e1-4ece-b166-a63e57b3b6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhumdbplje26", "content": "", "creation_timestamp": "2025-02-11T02:27:55.000645Z"}, {"uuid": "7b37e264-d83c-4d0a-b8a5-6598c9a37c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13019", "type": "seen", "source": "https://t.me/cvedetector/13902", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13019 - Code-projects Chat System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13019 \nPublished : Dec. 29, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /admin/update_room.php of the component Chat Room Page. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T20:44:13.000000Z"}, {"uuid": "9b629cdc-ef4d-49de-8e5d-465780df3a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13018", "type": "seen", "source": "https://t.me/cvedetector/13900", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13018 - PHPGurukul Maid Hiring Management System Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13018 \nPublished : Dec. 29, 2024, 6:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/profile.php. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T19:54:06.000000Z"}, {"uuid": "d2363420-ed2f-431c-89c7-240aee3f899b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13017", "type": "seen", "source": "https://t.me/cvedetector/13899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13017 - PHPGurukul Maid Hiring Management System Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13017 \nPublished : Dec. 29, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/aboutus.php of the component About Us Page. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T19:04:01.000000Z"}, {"uuid": "789017a0-18ba-4081-bfcc-ff276a12d94e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13015", "type": "seen", "source": "https://t.me/cvedetector/13898", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13015 - PHPGurukul Maid Hiring Management System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13015 \nPublished : Dec. 29, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T18:13:51.000000Z"}, {"uuid": "0f60c911-c061-459b-a677-e3a5bc5c4ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13014", "type": "seen", "source": "https://t.me/cvedetector/13896", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13014 - PHPGurukul Maid Hiring Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13014 \nPublished : Dec. 29, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability has been found in PHPGurukul Maid Hiring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/search-maid.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T17:23:39.000000Z"}, {"uuid": "a5eb603a-35a8-41ca-ac3f-48f0a2acfd6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13016", "type": "seen", "source": "https://t.me/cvedetector/13897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13016 - PHPGurukul Maid Hiring Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13016 \nPublished : Dec. 29, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/edit-category.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T18:13:50.000000Z"}, {"uuid": "14aec54e-b046-4453-85ee-58d6553879d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13013", "type": "seen", "source": "https://t.me/cvedetector/13895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13013 - PHPGurukul Maid Hiring Management System Cross Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-13013 \nPublished : Dec. 29, 2024, 2:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in PHPGurukul Maid Hiring Management System 1.0. Affected is an unknown function of the file /admin/contactus.php of the component Contact Us Page. The manipulation of the argument page title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-29T15:43:18.000000Z"}, {"uuid": "ab791283-af05-4308-938a-4e5db071705a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13017", "type": "seen", "source": "Telegram/4cYVWSW5J04-ZjYmT3aB3qeF_tDTglzZ5OTOfqM_HS_BGtVc", "content": "", "creation_timestamp": "2025-02-18T21:11:33.000000Z"}, {"uuid": "7e5ebc26-7fb8-4765-a548-c9126ecb3d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13016", "type": "seen", "source": "Telegram/xYoKe3DhoX6TQYxzR20ve5smrD2KTsoazGDXn3uIp7igsXqm", "content": "", "creation_timestamp": "2025-02-18T21:11:33.000000Z"}, {"uuid": "8aa2b70f-1ae9-4b63-8795-1d2088222ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1301", "type": "seen", "source": "https://t.me/ctinow/205899", "content": "https://ift.tt/iI9WnUC\nCVE-2024-1301", "creation_timestamp": "2024-03-12T17:32:08.000000Z"}, {"uuid": "a2eecb91-228d-47d4-98ed-a9a02d6b6d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13012", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3legyn7km4c2f", "content": "", "creation_timestamp": "2024-12-29T12:15:22.151092Z"}, {"uuid": "d27979ea-eab1-4c9b-ad15-abcc6705695f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13010", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981085096993190", "content": "", "creation_timestamp": "2025-02-10T18:48:55.033396Z"}, {"uuid": "6edea62a-2466-4e89-aaac-cb27c4d57110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981085112799530", "content": "", "creation_timestamp": "2025-02-10T18:48:55.278207Z"}, {"uuid": "d7fa6ed5-0fa5-4d0c-9d78-9273938fd12e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13010", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu6rc2ai2z", "content": "", "creation_timestamp": "2025-02-10T19:15:54.095914Z"}, {"uuid": "a2c76a8b-5c4e-4552-93e7-64e8e42d7816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu6trl4i2v", "content": "", "creation_timestamp": "2025-02-10T19:15:56.150124Z"}, {"uuid": "6baaf996-a605-4a56-ba42-9d3e52437935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113981557120057657", "content": "", "creation_timestamp": "2025-02-10T20:49:06.051430Z"}, {"uuid": "585a9f0c-bb20-419d-ba64-cde7230ef667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13010", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5whjxsg2q", "content": "", "creation_timestamp": "2025-02-10T22:10:13.616481Z"}, {"uuid": "69230580-5efd-4b01-a5a5-0be45a1a93e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13011", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhvuv7spf722", "content": "", "creation_timestamp": "2025-02-11T14:33:46.534647Z"}, {"uuid": "56738779-aa1a-4b85-9118-0cac42eb8c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13014", "type": "seen", "source": "Telegram/K6iHcpRrOx9R9OPVKvpfFc1r43nOZXgQBbV4LoFYL79k6JX9", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}, {"uuid": "d62ecc68-3dea-448c-b673-0975526fa66c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13013", "type": "seen", "source": "Telegram/FYPYm5O_QwZVpkBVOoOy-zz5nM2Orclz9_mtiMR77s02tndz", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}, {"uuid": "340453f1-58f3-4b01-98c8-fa59a4a4a63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1301", "type": "seen", "source": "https://t.me/ctinow/205891", "content": "https://ift.tt/iI9WnUC\nCVE-2024-1301", "creation_timestamp": "2024-03-12T17:31:59.000000Z"}]}