{"vulnerability": "CVE-2024-1068", "sightings": [{"uuid": "55e862c8-fa2e-4ae9-a940-23a80a67e324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10688", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451633545891484", "content": "", "creation_timestamp": "2024-11-09T06:42:25.616483Z"}, {"uuid": "5fcc7f63-eeea-428f-8e41-2932c9d61871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10683", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451633530944356", "content": "", "creation_timestamp": "2024-11-09T06:42:25.310202Z"}, {"uuid": "d29a6e34-d2ca-43ed-b073-23f3a0f96dfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10686", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473200331190179", "content": "", "creation_timestamp": "2024-11-13T02:07:08.604235Z"}, {"uuid": "75d2385b-be20-4b26-91f6-82b3901c3721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10685", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113467854461985122", "content": "", "creation_timestamp": "2024-11-12T03:27:37.152614Z"}, {"uuid": "6a097180-a764-4587-a26d-9c4bbdc14b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10682", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113518678385353857", "content": "", "creation_timestamp": "2024-11-21T02:52:48.652308Z"}, {"uuid": "4e2dceab-6226-4553-8431-fc218660b3a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10689", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113604963587332970", "content": "", "creation_timestamp": "2024-12-06T08:36:16.342933Z"}, {"uuid": "053363bb-d979-48d3-98a8-b9af028ab927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10680\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Form Maker by 10Web  WordPress plugin before 1.15.32 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2025-04-16T06:00:09.412Z\n\ud83d\udccf Modified: 2025-04-16T06:00:09.412Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/240948d7-ece0-437f-b926-62937bdbd9db/", "creation_timestamp": "2025-04-16T06:56:35.000000Z"}, {"uuid": "e05ebfda-1829-4d77-a106-e203e4c761e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10680", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvyq7bmiu2a", "content": "", "creation_timestamp": "2025-04-16T06:48:33.193753Z"}, {"uuid": "336f9882-c5f4-4b26-bf71-69c574b6a6c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10680", "type": "seen", "source": "https://t.me/cvedetector/23051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10680 - 10Web Form Maker Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10680 \nPublished : April 16, 2025, 6:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : The Form Maker by 10Web  WordPress plugin before 1.15.32 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T10:10:31.000000Z"}, {"uuid": "8439f216-3df0-45d3-abe3-4475f10a515b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10685", "type": "seen", "source": "https://t.me/cvedetector/10581", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10685 - Contact Form 7 Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10685 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : The Contact Form 7 Redirect &amp; Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:42.000000Z"}, {"uuid": "c4560803-0623-4468-8a97-be46bd9d0bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10681", "type": "seen", "source": "https://t.me/cvedetector/12201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10681 - The The ARMember \u2013 Membership Plugin, Content Rest\", \n  \"Content\": \"CVE ID : CVE-2024-10681 \nPublished : Dec. 6, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The The ARMember \u2013 Membership Plugin, Content Restriction, Member Levels, User Profile &amp; User signup plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.0.51. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with subscriber-level access and above, to execute arbitrary shortcodes. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T12:16:27.000000Z"}, {"uuid": "2fc3baf3-3335-4213-936e-63eedb3ddbdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10683", "type": "seen", "source": "https://t.me/cvedetector/10281", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10683 - Contact Form 7 - PayPal &amp; Stripe Add-on Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10683 \nPublished : Nov. 9, 2024, 7:15 a.m. | 39\u00a0minutes ago \nDescription : The Contact Form 7 \u2013 PayPal &amp; Stripe Add-on plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg &amp; remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is only exploitable when the leave a review notice is present in the dashboard. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T23:33:21.000000Z"}, {"uuid": "1b1d86ca-f154-4bae-aa44-614dc3f0cb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10688", "type": "seen", "source": "https://t.me/cvedetector/10280", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10688 - Attesa Extra Plugin WordPress Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-10688 \nPublished : Nov. 9, 2024, 7:15 a.m. | 39\u00a0minutes ago \nDescription : The Attesa Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.2 via the 'attesa-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T09:06:19.000000Z"}, {"uuid": "dca97592-194c-4541-bd5d-4ef92213b6da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10687", "type": "seen", "source": "https://t.me/cvedetector/9856", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10687 - WordPress Photos &amp; Files Plugin SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10687 \nPublished : Nov. 5, 2024, 10:15 a.m. | 38\u00a0minutes ago \nDescription : The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery \u2013 Upload, Vote, Sell via PayPal, Social Share Buttons plugin for WordPress is vulnerable to time-based SQL Injection via the $collectedIds parameter in all versions up to, and including, 24.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T12:11:40.000000Z"}, {"uuid": "64cc8f1c-54f5-4ff1-99a7-0d610ab55d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10684", "type": "seen", "source": "https://t.me/cvedetector/10788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10684 - Kognetiks Chatbot for WordPress Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10684 \nPublished : Nov. 13, 2024, 3:15 a.m. | 41\u00a0minutes ago \nDescription : The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dir' parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T04:57:45.000000Z"}]}