{"vulnerability": "CVE-2024-1047", "sightings": [{"uuid": "234130f3-22b0-4464-8763-13a5e0dccce3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451395446581817", "content": "", "creation_timestamp": "2024-11-09T05:41:52.517748Z"}, {"uuid": "4ad1b398-d6ae-4484-b4fd-0b114fb699cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10471", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113547774089547106", "content": "", "creation_timestamp": "2024-11-26T06:12:14.162000Z"}, {"uuid": "34fcb67d-33af-4cbf-955c-5bef144fd8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10473", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559074245551753", "content": "", "creation_timestamp": "2024-11-28T06:06:00.575973Z"}, {"uuid": "2fa58716-4c9a-4e95-a1f5-997544ae2feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668837652655192", "content": "", "creation_timestamp": "2024-12-17T15:20:17.358400Z"}, {"uuid": "1ea40e81-bcd7-4011-8825-cf6446afe7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/hackyourmom/9623", "content": "\ud83d\udc40 \u0423 \u0442\u0435\u043c\u0456 WPLMS \u0434\u043b\u044f WordPress \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c (CVE-2024-10470), \u044f\u043a\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0432\u0456\u0434\u0434\u0430\u043b\u0435\u043d\u0435 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043a\u043e\u0434\u0443 (RCE) \u2139\ufe0f \u0411\u0456\u043b\u044c\u0448\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u0438\u0446\u044c \ud83d\udc48", "creation_timestamp": "2024-11-12T14:16:36.000000Z"}, {"uuid": "e6e71aa5-b7cf-4156-a391-47f7de17c6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/1418", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}, {"uuid": "ae3ddb9e-c96a-4242-b996-594fd03b8478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10479", "type": "seen", "source": "https://t.me/cvedetector/9242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10479 - LinZhaoguan pb-cms Theme Management Module Remote Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10479 \nPublished : Oct. 29, 2024, 2:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in LinZhaoguan pb-cms up to 2.0.1. Affected is an unknown function of the file /admin#themes of the component Theme Management Module. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T03:53:58.000000Z"}, {"uuid": "583a6fa8-987b-4df9-8c3f-8df6df59874c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://t.me/cvedetector/13113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10476 - BD Diagnostic Solutions Default Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10476 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : Default credentials are used in the above listed BD Diagnostic Solutions products. If exploited, threat actors may be able to access, modify or delete data, including sensitive information such as protected health information (PHI) and personally identifiable information (PII). Exploitation of this vulnerability may allow an attacker to shut down or otherwise impact the availability of the system. Note: BD Synapsys\u2122 Informatics  \nSolution is only in scope of  \nthis vulnerability when  \ninstalled on a NUC server. BD Synapsys\u2122  \nInformatics Solution installed  \non a customer-provided virtual machine or on the BD Kiestra\u2122 SCU hardware is  \nnot in scope. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:37:01.000000Z"}, {"uuid": "27ba0172-a246-4bbe-9074-95506ba07863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/cvedetector/10277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10470 - \"WPLMS/WordPress LMS Arbitrary File Access Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10470 \nPublished : Nov. 9, 2024, 6:15 a.m. | 37\u00a0minutes ago \nDescription : The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T08:16:12.000000Z"}, {"uuid": "12ff3d42-3b6e-48ca-9d6f-f633462d03d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/InfoSecInsider/24349", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:07.000000Z"}, {"uuid": "d5eb30ed-6dcc-4e6d-9977-de5968648110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1047", "type": "seen", "source": "https://t.me/ctinow/177933", "content": "https://ift.tt/QZomOup\nCVE-2024-1047", "creation_timestamp": "2024-02-02T07:21:42.000000Z"}, {"uuid": "d50165e5-fa49-4b2f-9df8-fc9917b11e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1047", "type": "seen", "source": "https://t.me/ctinow/192545", "content": "https://ift.tt/tIkXqbg\nCVE-2024-1047 | ThemeIsle Orbit Fox Plugin up to 2.10.28 on WordPress authorization (ID 3029507)", "creation_timestamp": "2024-02-24T11:41:33.000000Z"}, {"uuid": "af47b4de-687d-4e88-a930-41489ac1bc75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/26374", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}, {"uuid": "ec10afb7-8608-4823-9115-124eb92c319b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "exploited", "source": "https://t.me/InfoSecInsider/673", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:08.000000Z"}]}