{"vulnerability": "CVE-2021-2440", "sightings": [{"uuid": "109b373e-2582-4659-b6fd-31acf329d41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24402", "type": "seen", "source": "https://t.me/cibsecurity/29091", "content": "\u203c CVE-2021-24402 \u203c\n\nThe Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-20T14:26:53.000000Z"}, {"uuid": "80636511-86b2-46d9-911f-8709e72dc557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24401", "type": "seen", "source": "https://t.me/cibsecurity/29084", "content": "\u203c CVE-2021-24401 \u203c\n\nThe Edit domain functionality in the WP Domain Redirect WordPress plugin through 1.0 has an `editid` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-20T14:26:46.000000Z"}, {"uuid": "34d836ec-ea4b-4cad-ac24-db2d71d2674c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24407", "type": "seen", "source": "https://t.me/cibsecurity/25923", "content": "\u203c CVE-2021-24407 \u203c\n\nThe Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-06T14:36:43.000000Z"}]}