{"vulnerability": "CVE-2024-1072", "sightings": [{"uuid": "09106b07-c3c2-457c-ba64-e2d5468e6ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10726", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113518678413331309", "content": "", "creation_timestamp": "2024-11-21T02:52:49.316656Z"}, {"uuid": "81eb17c8-3ecc-4d3a-af71-b4e0574b3f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10729", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546842059216098", "content": "", "creation_timestamp": "2024-11-26T02:15:12.331743Z"}, {"uuid": "b8688e2c-31ea-45a7-82de-e569a16a5a14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10727", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8222", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10727\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.\n\ud83d\udccf Published: 2025-03-20T10:10:58.253Z\n\ud83d\udccf Modified: 2025-03-20T15:53:17.600Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/259eed22-4d6f-4229-92e5-04674f302d5d\n2. https://github.com/phpipam/phpipam/commit/c1697bb6c4e4a6403d69c0868e1eb1040f98b731", "creation_timestamp": "2025-03-20T16:18:10.000000Z"}, {"uuid": "3865890d-6e20-422c-8ac9-d87f83551099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1072", "type": "seen", "source": "https://t.me/ctinow/191077", "content": "https://ift.tt/5kWq8wm\nCVE-2024-1072 | SeedProd Website Builder Plugin up to 6.15.21 on WordPress seedprod_lite_new_lpage authorization (ID 3029567)", "creation_timestamp": "2024-02-22T19:47:06.000000Z"}, {"uuid": "6ab790f2-2f20-4fc4-b911-a50fabdade0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10728", "type": "seen", "source": "https://t.me/cvedetector/11226", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10728 - WordPress PostX Plugin Unauthenticated Remote Plugin Installation and Activation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10728 \nPublished : Nov. 16, 2024, 5:15 a.m. | 29\u00a0minutes ago \nDescription : The Post Grid Gutenberg Blocks and WordPress Blog Plugin \u2013 PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T06:52:52.000000Z"}]}