{"vulnerability": "CVE-2024-10365", "sightings": [{"uuid": "d15e0a8b-d4f4-4aef-8a66-7198a3cd5569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113513943926741145", "content": "", "creation_timestamp": "2024-11-20T06:48:46.507317Z"}, {"uuid": "55647fc6-53d1-4104-a74c-643f46639175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10365", "type": "seen", "source": "https://t.me/cvedetector/11567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10365 - Elementor Addons Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-10365 \nPublished : Nov. 20, 2024, 7:15 a.m. | 24\u00a0minutes ago \nDescription : The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.3 via the render function in modules/widgets/tp_carousel_anything.php, modules/widgets/tp_page_scroll.php, and other widgets. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T08:43:31.000000Z"}]}