{"vulnerability": "CVE-2024-1062", "sightings": [{"uuid": "aada1288-e34c-43aa-b10a-da96f8e353a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10625", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113450840885712159", "content": "", "creation_timestamp": "2024-11-09T03:20:50.547845Z"}, {"uuid": "705052f5-c1a5-4856-814b-687548861cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10626", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113450840900865096", "content": "", "creation_timestamp": "2024-11-09T03:20:50.721912Z"}, {"uuid": "a27a501d-b6de-4888-90ac-55ca61c82210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473200316308165", "content": "", "creation_timestamp": "2024-11-13T02:07:08.379878Z"}, {"uuid": "1b446d18-1836-49be-96e1-043836ec7745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10623", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113519058552524254", "content": "", "creation_timestamp": "2024-11-21T04:29:29.544831Z"}, {"uuid": "78e8cb1c-8ca7-40d1-a640-e72572f4f3b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113893015288862979", "content": "", "creation_timestamp": "2025-01-26T05:31:36.642734Z"}, {"uuid": "cfe1c3b3-9422-4af0-b9bf-a23eaa0229e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lgleqibozc2z", "content": "", "creation_timestamp": "2025-01-25T16:53:00.924493Z"}, {"uuid": "7c63303f-13af-4f8e-b29e-0684262fad71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113892999642194623", "content": "", "creation_timestamp": "2025-01-26T05:27:37.900584Z"}, {"uuid": "eeb89f7c-6a51-49bf-a27f-3511f16f8b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgmzfkxbgc2b", "content": "", "creation_timestamp": "2025-01-26T08:35:23.187573Z"}, {"uuid": "3f28e647-33ca-47a2-a806-d379f9a92397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgmrlvoiti2t", "content": "", "creation_timestamp": "2025-01-26T06:15:43.550538Z"}, {"uuid": "b264d2e3-be0a-48c6-ae5b-8edc4ecbb5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114135164423772222", "content": "", "creation_timestamp": "2025-03-09T23:53:19.110563Z"}, {"uuid": "72d8a4d0-bbb5-4ad6-ade5-a7cb43253fe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3ljyabqpqc22j", "content": "", "creation_timestamp": "2025-03-09T23:53:23.088694Z"}, {"uuid": "2cdbf509-8b03-4a33-bb2a-93d66b3b9430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3llgb4rebw22j", "content": "", "creation_timestamp": "2025-03-28T07:11:01.317235Z"}, {"uuid": "881cb096-2bfa-4112-9f18-1e09953b77ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:45.000000Z"}, {"uuid": "5001b41e-fe04-4730-8323-774b0adf6e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:47:59.000000Z"}, {"uuid": "205d92b0-a6b1-4149-a987-69a9a5b1b28c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:33.000000Z"}, {"uuid": "7668bea2-1566-4a8a-afcb-47545a39b5c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "d903d8f0-cf90-40dc-9e08-72ca3826b67f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3114", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-85qx-mfpj-cvj4\n\ud83d\udd25 CVSS Score: N/A (CVSS_V3)\n\ud83d\udd39 Description: The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to SQL Injection via the \u2018id\u2019 parameter in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-26T06:30:48Z\n\ud83d\udccf Modified: 2025-01-26T06:30:48Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10628\n2. https://ays-pro.com/changelog-for-quiz-maker-pro\n3. https://ays-pro.com/wordpress/quiz-maker\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd873e5-fd65-48c3-a71d-aaf6d8372606?source=cve", "creation_timestamp": "2025-01-26T07:06:01.000000Z"}, {"uuid": "3cf1b666-573f-4d29-863a-56d41c522aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3121", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10628\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-26T06:15:22.980\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://ays-pro.com/changelog-for-quiz-maker-pro\n2. https://ays-pro.com/wordpress/quiz-maker\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd873e5-fd65-48c3-a71d-aaf6d8372606?source=cve", "creation_timestamp": "2025-01-26T07:14:14.000000Z"}, {"uuid": "3f7ac062-d0af-49f4-a1ac-0cd61435b9a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_News/1664", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2024-10629: GPX Viewer Exploit\nLink: https://darkwebinformer.com/cve-2024-10629-gpx-viewer-exploit/", "creation_timestamp": "2025-03-09T23:53:55.000000Z"}, {"uuid": "1ebc52be-174b-4a92-9944-f36ad6bc4c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10628", "type": "seen", "source": "https://t.me/cvedetector/16412", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10628 - Woocommerce Quiz Maker SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10628 \nPublished : Jan. 26, 2025, 6:15 a.m. | 1\u00a0hour, 36\u00a0minutes ago \nDescription : The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to SQL Injection via the \u2018id\u2019 parameter in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-26T09:03:19.000000Z"}, {"uuid": "1b15312a-d6e6-4db8-b249-f880137ead88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1585", "content": "GPX Viewer &lt;= 2.2.8 - Authenticated (Subscriber+) Arbitrary File Creation.\n\nhttps://github.com/Nxploited/CVE-2024-10629", "creation_timestamp": "2025-03-11T14:16:13.000000Z"}, {"uuid": "25151f6c-b211-4e42-b196-c67540b533d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10626", "type": "seen", "source": "https://t.me/cvedetector/10271", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10626 - WooCommerce Support Ticket System for WordPress Path Traversal RCE\", \n  \"Content\": \"CVE ID : CVE-2024-10626 \nPublished : Nov. 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T05:45:46.000000Z"}, {"uuid": "08272072-9aee-46bd-8d53-88e3cea3cd93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10625", "type": "seen", "source": "https://t.me/cvedetector/10270", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10625 - WooCommerce Support Ticket System for WordPress File Deletion Vulnerability (Arbitrary File Deletion)\", \n  \"Content\": \"CVE ID : CVE-2024-10625 \nPublished : Nov. 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T05:45:46.000000Z"}, {"uuid": "bdbdddd3-449f-4842-9e63-43a31eaab468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10627", "type": "seen", "source": "https://t.me/cvedetector/10266", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10627 - WooCommerce Support Ticket System Unauthenticated Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10627 \nPublished : Nov. 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T05:45:39.000000Z"}, {"uuid": "555c8e7d-cc5b-4efe-b1df-10a7dc83d1d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10620", "type": "seen", "source": "https://t.me/cvedetector/9564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10620 - Knighliao Disconf Remote Configuration Center Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10620 \nPublished : Nov. 1, 2024, 5:15 a.m. | 43\u00a0minutes ago \nDescription : A vulnerability was found in knightliao Disconf 2.6.36. It has been classified as critical. This affects an unknown part of the file /api/config/list of the component Configuration Center. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T07:09:18.000000Z"}, {"uuid": "00d77560-9e66-4636-8e77-3c1a4a4cab37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/14587", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udcc5 Date: 2025-03-14 03:46:52\n\ud83d\udea8 Title: Alleged disclosure of WordPress GPX Viewer 2.2.8 Arbitrary File Creation Exploit\n\ud83d\udee1\ufe0f Victim Country: \n\ud83c\udfed Victim Industry: \n\ud83c\udfe2 Victim Organization: \n\ud83c\udf10 Victim Site: \n\ud83d\udcdc Category: Vulnerability\n\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Threat Actor: Nxploited\n\ud83c\udf0d Network: openweb\n\ud83d\udd17 Claim: https://0day.today/exploit/description/39945\n\ud83d\udcdd Description: The threat actor claims to have disclosed an exploit for WordPress GPX Viewer 2.2.8, affecting PHP-based web applications. The vulnerability (CVE-2024-10629) allows attackers to create arbitrary files on the server, posing a high security risk.\n\n\u26a0\ufe0f Stay ahead of cyber threats! Subscribe to the Paid Threat Feed at https://t.me/DarkWebInformer_Bot for real-time updates (Website excluded). Want to pay via crypto? Visit https://darkwebinformer.com/crypto-payments.", "creation_timestamp": "2025-03-14T04:46:55.000000Z"}, {"uuid": "157f0181-5a25-49eb-8d12-5555fde92f96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/14333", "content": "\ud83d\udea8CVE-2024-10629: GPX Viewer Exploit\n\nLink: https://github.com/Nxploited/CVE-2024-10629", "creation_timestamp": "2025-03-10T00:53:13.000000Z"}, {"uuid": "0fcf8c41-b1a8-4c8c-869a-f28be6018998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "Telegram/38K1WrMKcanAdyUHJnNR0fgo1ZD-5xBIXGQ7-ikFesLKciU", "content": "", "creation_timestamp": "2025-03-10T08:00:10.000000Z"}, {"uuid": "f61bf928-aaf6-4412-8e06-2dd17bda0cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "Telegram/wMOImsP-fbvH_akSNtbdu6YY2KzC3pXXzZDc7bF__jHkHoI", "content": "", "creation_timestamp": "2025-03-10T04:00:07.000000Z"}, {"uuid": "781eb5cb-0a3c-43cf-b065-e3aa2c2ac80a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1062", "type": "seen", "source": "https://t.me/ctinow/183112", "content": "https://ift.tt/y6TUXSw\nCVE-2024-1062", "creation_timestamp": "2024-02-12T14:22:23.000000Z"}, {"uuid": "ba93b624-e19e-4143-96ca-c719a60ceb0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10629", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8044", "content": "GPX Viewer &lt;= 2.2.8 - Authenticated (Subscriber+) Arbitrary File Creation.\n\nhttps://github.com/Nxploited/CVE-2024-10629", "creation_timestamp": "2025-03-11T14:20:27.000000Z"}, {"uuid": "01126363-eb06-48e6-90df-cb7749085607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1062", "type": "seen", "source": "https://t.me/ctinow/190334", "content": "https://ift.tt/fHuNqhV\nCVE-2024-1062 | 389-ds-base log_entry_attr heap-based overflow", "creation_timestamp": "2024-02-22T02:21:42.000000Z"}, {"uuid": "e57c754e-68af-429a-a7fd-81ce141cae9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1062", "type": "seen", "source": "https://t.me/ctinow/176491", "content": "https://ift.tt/qe2yTFK\nCVE-2024-1062", "creation_timestamp": "2024-01-31T05:46:33.000000Z"}]}