{"vulnerability": "CVE-2021-2427", "sightings": [{"uuid": "43c081b3-e2e3-445c-8dc2-ff9c262f7951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24275", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-24275.yaml", "content": "", "creation_timestamp": "2023-04-27T09:58:59.000000Z"}, {"uuid": "16cf7254-d5ff-4690-9068-68a888f478ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24276", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3300", "content": "#exploit\nWordPress vulnerabilities:\n\n1. CVE-2021-24258:\nElements Kit Lite/Elements Kit Pro WordPress Plugins &lt;2.2.0 have a number of widgets that are vulnerable to stored XSS by lower-privileged users such as contributors, all via a similar method\nhttps://github.com/GoogleProjectZer0/CVE-2021-24258\n\n2. PoC script to exploit CVE-2021-24276:\nhttps://github.com/GoogleProjectZer0/CVE-2021-24276", "creation_timestamp": "2021-12-07T03:34:20.000000Z"}]}