{"vulnerability": "CVE-2024-1077", "sightings": [{"uuid": "67e8606e-fd1a-49ba-95d3-55242b22b7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10779", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113450738791714371", "content": "", "creation_timestamp": "2024-11-09T02:54:52.988071Z"}, {"uuid": "4ad53ecd-5d95-4c6a-978f-3bde220eeea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10770", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451152292748893", "content": "", "creation_timestamp": "2024-11-09T04:40:02.230385Z"}, {"uuid": "35bf163a-96fd-4a0f-bfd3-5e655541e9f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10778", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473259352194103", "content": "", "creation_timestamp": "2024-11-13T02:22:09.246383Z"}, {"uuid": "cba94164-3c21-4dd6-acc5-05b505330870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10777", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113599519395525535", "content": "", "creation_timestamp": "2024-12-05T09:31:44.884422Z"}, {"uuid": "789679e5-c1e8-496e-b004-60ccb9e35863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10777", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113599533047049471", "content": "", "creation_timestamp": "2024-12-05T09:35:12.946013Z"}, {"uuid": "b02c0f17-671e-427a-adbb-3b2faa368cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10771", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113605876542214022", "content": "", "creation_timestamp": "2024-12-06T12:28:27.075701Z"}, {"uuid": "7392e491-2dbb-47b5-aa23-ef25bb0d41eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfrmbo6czw25", "content": "", "creation_timestamp": "2025-01-15T10:58:39.160237Z"}, {"uuid": "c47bcab8-d4a2-4fc6-8e82-11682275bf32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113831661320283011", "content": "", "creation_timestamp": "2025-01-15T09:28:29.214557Z"}, {"uuid": "d5d52f6c-a0aa-4b72-b709-b83060789124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrjuwmcv52r", "content": "", "creation_timestamp": "2025-01-15T10:15:44.157037Z"}, {"uuid": "d4b8cb6d-a299-499a-a598-782a5dd623b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://t.me/cvedetector/15416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10775 - Piotnet Addons For Elementor Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10775 \nPublished : Jan. 15, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.4.32 via the 'pafe-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T11:45:47.000000Z"}, {"uuid": "4b958c26-b0a3-494d-82fd-b7222b7f1130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10775", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1718", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10775\n\ud83d\udd39 Description: The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.4.32 via the 'pafe-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.\n\ud83d\udccf Published: 2025-01-15T09:25:54.399Z\n\ud83d\udccf Modified: 2025-01-15T09:25:54.399Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdbc9bc-70cf-4440-b12d-dd98844d33bc?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3221445%40piotnet-addons-for-elementor&amp;new=3221445%40piotnet-addons-for-elementor&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-15T10:12:30.000000Z"}, {"uuid": "e6a83d6f-36e8-45e3-9148-9dd59cbce6bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10779", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3413", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10779\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: The Cowidgets \u2013 Elementor Addons plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.0 via the 'ce_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.\n\ud83d\udccf Published: 2024-11-09T03:30:44Z\n\ud83d\udccf Modified: 2025-01-29T21:31:23Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10779\n2. https://wordpress.org/plugins/cowidgets-elementor-addons\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/ec005f9f-3f63-4d73-9bd5-dc9c4c4b8bfe?source=cve", "creation_timestamp": "2025-01-29T22:11:05.000000Z"}, {"uuid": "527c443d-e2e3-434c-8aa0-2d959269bd66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1077", "type": "seen", "source": "https://t.me/ctinow/176345", "content": "https://ift.tt/W3sCQEK\nCVE-2024-1077", "creation_timestamp": "2024-01-30T23:26:27.000000Z"}, {"uuid": "64ddfae3-d0c0-4218-969c-ad9f3010de2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10771", "type": "seen", "source": "https://t.me/cvedetector/12211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10771 - Due to missing input validation during one step of\", \n  \"Content\": \"CVE ID : CVE-2024-10771 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : Due to missing input validation during one step of the firmware update process, the product  \nis vulnerable to remote code execution. With network access and the user level \u201dService\u201d, an attacker  \ncan execute arbitrary system commands in the root user\u2019s contexts. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:13.000000Z"}, {"uuid": "89b310ee-3647-4e40-8412-5cdf265f5aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10773", "type": "seen", "source": "https://t.me/cvedetector/12210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10773 - The product is vulnerable to pass-the-hash attacks\", \n  \"Content\": \"CVE ID : CVE-2024-10773 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain  \nfull access to the device. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:09.000000Z"}, {"uuid": "648d845c-1f9a-45b3-b487-2b7f9fb680e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10772", "type": "seen", "source": "https://t.me/cvedetector/12209", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10772 - Since the firmware update is not validated, an att\", \n  \"Content\": \"CVE ID : CVE-2024-10772 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : Since the firmware update is not validated, an attacker can install modified firmware on the  \ndevice. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:08.000000Z"}, {"uuid": "1b3e44f4-05ff-43c9-a611-eafa1c98c1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10776", "type": "seen", "source": "https://t.me/cvedetector/12207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10776 - Lua apps can be deployed, removed, started, reload\", \n  \"Content\": \"CVE ID : CVE-2024-10776 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : Lua apps can be deployed, removed, started, reloaded or stopped without authorization via  \nAppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write  \nfiles or load apps that use all features of the product available to a customer. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:07.000000Z"}, {"uuid": "40851902-d27f-49ed-89c2-2f5e3c35c78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10774", "type": "seen", "source": "https://t.me/cvedetector/12206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10774 - Unauthenticated CROWN APIs allow access to critica\", \n  \"Content\": \"CVE ID : CVE-2024-10774 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:06.000000Z"}, {"uuid": "deb89446-af79-4394-93fa-02453ff855e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10777", "type": "seen", "source": "https://t.me/cvedetector/12075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10777 - The AnyWhere Elementor plugin for WordPress is vul\", \n  \"Content\": \"CVE ID : CVE-2024-10777 \nPublished : Dec. 5, 2024, 10:31 a.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : The AnyWhere Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.11 via the 'INSERT_ELEMENTOR' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T12:50:42.000000Z"}, {"uuid": "ba4c4cbd-221b-44b4-bff7-29f8ba12da3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10770", "type": "seen", "source": "https://t.me/cvedetector/10273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10770 - Elementor Envo Extra WordPress Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10770 \nPublished : Nov. 9, 2024, 5:15 a.m. | 16\u00a0minutes ago \nDescription : The Envo Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.3 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T06:35:52.000000Z"}, {"uuid": "af5c1b99-4f82-484d-8064-0c1a2d2e5bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10779", "type": "seen", "source": "https://t.me/cvedetector/10258", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10779 - \"Cowidgets Elementor Addons WordPress Information Exposure\"\", \n  \"Content\": \"CVE ID : CVE-2024-10779 \nPublished : Nov. 9, 2024, 3:15 a.m. | 37\u00a0minutes ago \nDescription : The Cowidgets \u2013 Elementor Addons plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.0 via the 'ce_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T04:55:20.000000Z"}, {"uuid": "49587bb5-e381-4bcf-a3ae-026ca6d3803e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1077", "type": "seen", "source": "https://t.me/ctinow/190578", "content": "https://ift.tt/4LKYQSa\nCVE-2024-1077 | Google Chrome prior 121.0.6167.139 Network use after free (FEDORA-2024-87e0baecb6)", "creation_timestamp": "2024-02-22T10:06:37.000000Z"}]}