{"vulnerability": "CVE-2024-1063", "sightings": [{"uuid": "177bcc85-87b9-4444-8613-673b0d2f2916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-10637", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113643879513000912", "content": "", "creation_timestamp": "2024-12-13T05:33:07.048687Z"}, {"uuid": "ec068aa3-f0e9-408b-bb72-7de10c8bdce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10630", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpqupwj7q2j", "content": "", "creation_timestamp": "2025-01-14T17:15:33.202891Z"}, {"uuid": "0caad9e3-c460-48d2-81d4-4565c5daa54b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10630", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827399766442285", "content": "", "creation_timestamp": "2025-01-14T15:24:45.303470Z"}, {"uuid": "79c9bb9f-7b25-44ce-a86d-3a5966abb997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lgleldspy223", "content": "", "creation_timestamp": "2025-01-25T16:50:08.128623Z"}, {"uuid": "92d5aa96-b22e-4d8c-ab71-ce181e26b30d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lglemcrc7s2z", "content": "", "creation_timestamp": "2025-01-25T16:50:40.451493Z"}, {"uuid": "e5caa188-4ec4-4c21-b190-541b6c83eff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lglemwyebk2z", "content": "", "creation_timestamp": "2025-01-25T16:51:01.588258Z"}, {"uuid": "15d0c5cd-5bb5-427e-a9b8-99e70b19cd9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113892999658579758", "content": "", "creation_timestamp": "2025-01-26T05:27:38.129200Z"}, {"uuid": "9e47e011-9e2d-4997-9e01-9983e677659d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113893015303494360", "content": "", "creation_timestamp": "2025-01-26T05:31:36.842569Z"}, {"uuid": "ebb3443d-5eff-49f6-b9de-e3ecc6d1015f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113893074318909236", "content": "", "creation_timestamp": "2025-01-26T05:46:37.318946Z"}, {"uuid": "ffd7d097-9333-4120-8f28-263d1d3f2e27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgmrlya3bx2j", "content": "", "creation_timestamp": "2025-01-26T06:15:46.063602Z"}, {"uuid": "860e687c-415d-4d0e-9c6b-e16e7a308b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgmrm2dc4f2h", "content": "", "creation_timestamp": "2025-01-26T06:15:48.644356Z"}, {"uuid": "1d676399-392c-4a66-b9bc-54eb75ea20e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgmzfkijqk2b", "content": "", "creation_timestamp": "2025-01-26T08:35:21.018461Z"}, {"uuid": "ef9e909f-f20f-49bc-8292-f3d8fadd7355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgmzfl3ad72i", "content": "", "creation_timestamp": "2025-01-26T08:35:23.705515Z"}, {"uuid": "8d302094-32bf-4492-b619-715a8f8bad88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10630", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1540", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10630\n\ud83d\udd39 Description: A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality.\n\ud83d\udccf Published: 2025-01-14T16:49:45.799Z\n\ud83d\udccf Modified: 2025-01-14T16:49:45.799Z\n\ud83d\udd17 References:\n1. https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630", "creation_timestamp": "2025-01-14T17:21:40.000000Z"}, {"uuid": "fe737073-fa10-4d1d-aa3a-52427f154d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10635", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114417770947390618", "content": "", "creation_timestamp": "2025-04-28T21:43:52.402908Z"}, {"uuid": "b221a016-c559-475d-9705-cfcfa7020274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10635", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnvx5v56rr2a", "content": "", "creation_timestamp": "2025-04-28T23:45:37.710583Z"}, {"uuid": "b81179e2-f8fe-4ceb-99c2-8cc87752fe8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-10630", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1461", "content": "", "creation_timestamp": "2025-01-17T04:00:00.000000Z"}, {"uuid": "d9bad3d4-6525-4767-9c5b-9a34f5237ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10635", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13743", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10635\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system.\n\ud83d\udccf Published: 2025-04-28T20:36:43.320Z\n\ud83d\udccf Modified: 2025-04-28T20:36:43.320Z\n\ud83d\udd17 References:\n1. https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0002", "creation_timestamp": "2025-04-28T21:11:07.000000Z"}, {"uuid": "88adbb6a-9eeb-4ff8-9b4a-b5ebe8cf9f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3119", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10636\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-26T06:15:23.293\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://ays-pro.com/changelog-for-quiz-maker-pro\n2. https://ays-pro.com/wordpress/quiz-maker\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/6e845eae-dae9-40bb-aca9-21afaa40576d?source=cve", "creation_timestamp": "2025-01-26T07:14:13.000000Z"}, {"uuid": "594595f6-8bf6-476f-974e-60a6c2e1c094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10638", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8617", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10638\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Product Labels For Woocommerce (Sale Badges) WordPress plugin before 1.5.11 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks\n\ud83d\udccf Published: 2025-03-25T06:00:08.951Z\n\ud83d\udccf Modified: 2025-03-25T06:00:08.951Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/32a7a778-2211-45b4-bdc2-528f27b7d4fe/", "creation_timestamp": "2025-03-25T06:23:57.000000Z"}, {"uuid": "c7109142-ca21-4800-b1d1-c751d5cec4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3112", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-wq7f-4g58-w2c5\n\ud83d\udd25 CVSS Score: N/A (CVSS_V3)\n\ud83d\udd39 Description: The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018content\u2019 parameter in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-26T06:30:48Z\n\ud83d\udccf Modified: 2025-01-26T06:30:48Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10636\n2. https://ays-pro.com/changelog-for-quiz-maker-pro\n3. https://ays-pro.com/wordpress/quiz-maker\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/6e845eae-dae9-40bb-aca9-21afaa40576d?source=cve", "creation_timestamp": "2025-01-26T07:05:59.000000Z"}, {"uuid": "afdc787c-b65a-4f0a-9a90-b3a62e4b9642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3113", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-8v6p-c4w2-r9xw\n\ud83d\udd25 CVSS Score: N/A (CVSS_V3)\n\ud83d\udd39 Description: The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency). This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\n\ud83d\udccf Published: 2025-01-26T06:30:48Z\n\ud83d\udccf Modified: 2025-01-26T06:30:48Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10633\n2. https://ays-pro.com/changelog-for-quiz-maker-pro\n3. https://ays-pro.com/wordpress/quiz-maker\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/eb81f83f-a0e7-46d9-b106-fe31f8ad3eb9?source=cve", "creation_timestamp": "2025-01-26T07:06:00.000000Z"}, {"uuid": "52a9347c-7cbb-4fe5-9dea-5d2e2785bbcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17045", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10634\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Nokaut Offers Box WordPress plugin through 1.4.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin reset the Nokaut Offers Box WordPress plugin through 1.4.0 via a CSRF attack\n\ud83d\udccf Published: 2025-05-15T20:06:45.345Z\n\ud83d\udccf Modified: 2025-05-20T19:37:37.108Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/", "creation_timestamp": "2025-05-20T19:40:46.000000Z"}, {"uuid": "c40b3292-391d-4378-9b5c-7de62ffa3ae6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10639", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10639\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Auto Prune Posts WordPress plugin before 3.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2025-05-15T20:06:45.594Z\n\ud83d\udccf Modified: 2025-05-20T19:37:25.707Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/efab3a36-535b-40ff-b98f-482a0e5193f1/", "creation_timestamp": "2025-05-20T19:40:50.000000Z"}, {"uuid": "d27d3d60-2b5c-4654-8d13-e6a09e0532c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10635", "type": "seen", "source": "https://t.me/cvedetector/23943", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10635 - Enterprise Protection S/MIME Attachment Defense Improper Input Validation\", \n  \"Content\": \"CVE ID : CVE-2024-10635 \nPublished : April 28, 2025, 9:15 p.m. | 34\u00a0minutes ago \nDescription : Enterprise Protection contains an improper input validation vulnerability in attachment defense that allows an unauthenticated remote attacker to bypass attachment scanning security policy by sending a malicious S/MIME attachment with an opaque signature. When opened by a recipient in a downstream email client, the malicious attachment could cause partial loss of integrity and confidentiality to their system. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-29T00:06:16.000000Z"}, {"uuid": "25d14a12-ddce-4c0b-9de0-93f1738243db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10630", "type": "seen", "source": "https://t.me/cvedetector/15310", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10630 - Ivanti Application Control Engine Race Condition Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10630 \nPublished : Jan. 14, 2025, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:01:24.000000Z"}, {"uuid": "d927c894-e076-4bdf-b708-42b79605a641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10636", "type": "seen", "source": "https://t.me/cvedetector/16409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10636 - Quiz Maker Business/Developer/Agency WordPress Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-10636 \nPublished : Jan. 26, 2025, 6:15 a.m. | 1\u00a0hour, 36\u00a0minutes ago \nDescription : The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018content\u2019 parameter in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-26T09:03:13.000000Z"}, {"uuid": "04bbc587-b398-4550-a521-a528ba95d6f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10633", "type": "seen", "source": "https://t.me/cvedetector/16408", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10633 - Quiz Maker Business, Developer, and Agency WordPress Plugin Shortcode Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10633 \nPublished : Jan. 26, 2025, 6:15 a.m. | 1\u00a0hour, 36\u00a0minutes ago \nDescription : The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency). This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-26T09:03:13.000000Z"}, {"uuid": "3b174908-8b13-467a-af0a-1bd8f37f0174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1063", "type": "seen", "source": "https://t.me/ctinow/190463", "content": "https://ift.tt/0152JQU\nCVE-2024-1063 | Appwrite up to 1.4.13 /v1/avatars/favicon server-side request forgery", "creation_timestamp": "2024-02-22T06:37:06.000000Z"}, {"uuid": "0f314951-0c0b-4513-9cf7-8710f3f081e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1063", "type": "seen", "source": "https://t.me/ctinow/175842", "content": "https://ift.tt/kb3cKqU\nCVE-2024-1063", "creation_timestamp": "2024-01-30T11:21:29.000000Z"}]}