{"vulnerability": "CVE-2024-10708", "sightings": [{"uuid": "53b74e61-48ff-4a42-8c9d-fcf508891a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10708", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113627002384730507", "content": "", "creation_timestamp": "2024-12-10T06:01:01.624622Z"}, {"uuid": "19ab9e4f-7af7-4b1c-8d01-0ae6f586159f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10708", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-10708.yaml", "content": "", "creation_timestamp": "2025-10-08T00:18:12.000000Z"}, {"uuid": "4a2ef892-0812-46c0-b744-5ddab2cb9689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10708", "type": "seen", "source": "https://t.me/cvedetector/12482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10708 - \"WordPress System Dashboard Path Traversal Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10708 \nPublished : Dec. 10, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T08:16:31.000000Z"}]}