{"vulnerability": "CVE-2024-1081", "sightings": [{"uuid": "42adb534-8824-48e7-b9a5-381dd91cc88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10814", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451152308031341", "content": "", "creation_timestamp": "2024-11-09T04:40:02.622302Z"}, {"uuid": "5700cebc-d30b-4b5d-9a01-259f8306eace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10813", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113530166946066706", "content": "", "creation_timestamp": "2024-11-23T03:34:30.354297Z"}, {"uuid": "4a4ecf89-02ec-4813-b414-2bc117b52b7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827786833411596", "content": "", "creation_timestamp": "2025-01-14T17:03:10.113767Z"}, {"uuid": "77921198-e6cf-4b2e-a1b5-fb95f795bf4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpqusgkl62n", "content": "", "creation_timestamp": "2025-01-14T17:15:35.796968Z"}, {"uuid": "c8dfbf11-1b23-4a69-8ad8-b14a29867524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113827965285447738", "content": "", "creation_timestamp": "2025-01-14T17:48:35.155914Z"}, {"uuid": "820c1526-f260-4bcb-bc00-29b5724b94b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10815", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113796873432910002", "content": "", "creation_timestamp": "2025-01-09T06:01:28.523630Z"}, {"uuid": "b79c7be4-2437-4d0d-a9f3-9052e965ec2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10815", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfbzobqkor25", "content": "", "creation_timestamp": "2025-01-09T06:15:44.541429Z"}, {"uuid": "aaee54ff-f212-47ec-a8f3-fc09744afc7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10815", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfc3aovrwd2w", "content": "", "creation_timestamp": "2025-01-09T06:43:56.096706Z"}, {"uuid": "4381b22b-0d90-4345-b526-5e7ec9f5cd38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lftwfxd45224", "content": "", "creation_timestamp": "2025-01-16T09:05:19.151937Z"}, {"uuid": "2c2bbb9e-aae2-437c-8f32-d389c1511362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lftwjio2kc2n", "content": "", "creation_timestamp": "2025-01-16T09:07:19.037634Z"}, {"uuid": "5718a3eb-35d6-4608-82b3-1c81533836d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lfvn4knnyk2v", "content": "", "creation_timestamp": "2025-01-17T01:24:20.798702Z"}, {"uuid": "0a6144ee-46db-48b5-83dc-a2cbe58b0b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10812", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-10812.yaml", "content": "", "creation_timestamp": "2025-01-22T13:30:16.000000Z"}, {"uuid": "9d4f0f6a-73b5-4301-a475-a611e1c304a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10812", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lglsnplvyj2h", "content": "", "creation_timestamp": "2025-01-25T21:01:58.347667Z"}, {"uuid": "93c9fb06-5aec-4be1-9689-401319d42002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3liyneq4oos2r", "content": "", "creation_timestamp": "2025-02-25T10:22:28.165467Z"}, {"uuid": "2ce5e92a-f6e6-4215-8e9a-42aaa23faa15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3linbk4kmhg22", "content": "", "creation_timestamp": "2025-02-20T21:51:26.624311Z"}, {"uuid": "3c5cda51-6ffa-4782-af08-f56151bf3967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lijm7hjler2i", "content": "", "creation_timestamp": "2025-02-19T10:51:41.791635Z"}, {"uuid": "8de496fb-248b-4636-955e-701a91e7417c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://bsky.app/profile/rxerium.com/post/3lk4qv52j5z2e", "content": "", "creation_timestamp": "2025-03-11T19:01:10.844526Z"}, {"uuid": "69b6cc70-b548-4738-a34f-d2f69fb2378d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-925fae68-b6651114658b01d3", "content": "", "creation_timestamp": "2025-02-22T15:37:36.695187Z"}, {"uuid": "8dae0ba7-9047-4897-bb58-0495615a68f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "7eb4c231-e79b-4006-8e73-809d1249a80a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1519", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10811\n\ud83d\udd39 Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.\n\ud83d\udccf Published: 2025-01-14T16:59:32.982Z\n\ud83d\udccf Modified: 2025-01-14T16:59:32.982Z\n\ud83d\udd17 References:\n1. https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", "creation_timestamp": "2025-01-14T17:20:07.000000Z"}, {"uuid": "4ad3f228-3a2a-4368-b2eb-6d22190d3607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1461", "content": "", "creation_timestamp": "2025-01-17T04:00:00.000000Z"}, {"uuid": "8214550c-c7da-4022-8738-8455b73a15f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10815", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/898", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10815\n\ud83d\udd39 Description: The PostLists WordPress plugin through 2.0.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers\n\ud83d\udccf Published: 2025-01-09T06:00:04.225Z\n\ud83d\udccf Modified: 2025-01-09T06:00:04.225Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/309a445a-6261-4bd1-bac0-a78096d0c12b/", "creation_timestamp": "2025-01-09T06:21:40.000000Z"}, {"uuid": "ba147b0b-045b-413b-95f6-c68f67dbbd83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10818", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10818\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The JSFiddle Shortcode WordPress plugin before 1.1.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.\n\ud83d\udccf Published: 2025-05-15T20:06:46.531Z\n\ud83d\udccf Modified: 2025-05-20T19:37:05.128Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/aafd152c-1a05-4191-a1bc-b802d801ca03/", "creation_timestamp": "2025-05-20T19:41:06.000000Z"}, {"uuid": "ae3b6a2b-590e-429a-b5eb-e79fe58c393f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6922", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10811\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.\n\ud83d\udccf Published: 2025-01-14T16:59:32.982Z\n\ud83d\udccf Modified: 2025-03-08T04:55:14.273Z\n\ud83d\udd17 References:\n1. https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6", "creation_timestamp": "2025-03-08T05:35:27.000000Z"}, {"uuid": "e518ee3f-5f36-45b0-98c9-c578bddc4f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10810", "type": "seen", "source": "https://t.me/cvedetector/9811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10810 - Code-projects E-Health Care System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10810 \nPublished : Nov. 5, 2024, 2:15 a.m. | 29\u00a0minutes ago \nDescription : A vulnerability was found in code-projects E-Health Care System 1.0. It has been classified as critical. Affected is an unknown function of the file Doctor/app_request.php. The manipulation of the argument app_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T03:49:41.000000Z"}, {"uuid": "7dbbb631-2189-46f6-ac90-de20709c8318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10814", "type": "seen", "source": "https://t.me/cvedetector/10274", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10814 - WordPress Code Embed SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-10814 \nPublished : Nov. 9, 2024, 5:15 a.m. | 16\u00a0minutes ago \nDescription : The Code Embed plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5 via the ce_get_file() function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T06:35:52.000000Z"}, {"uuid": "abf379bd-e3b4-46f8-94e8-34ef5694ce6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10816", "type": "seen", "source": "https://t.me/cvedetector/10794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10816 - Luna Radio Player Plugin Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10816 \nPublished : Nov. 13, 2024, 4:15 a.m. | 23\u00a0minutes ago \nDescription : The LUNA RADIO PLAYER plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.24.01.24 via the js/fallback.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T05:48:00.000000Z"}, {"uuid": "201271b5-251f-41b9-be27-8fa029ebe45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://t.me/cvedetector/15309", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10811 - Ivanti EPM Path Traversal Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-10811 \nPublished : Jan. 14, 2025, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:01:24.000000Z"}, {"uuid": "5023ee01-1cde-4aeb-9a84-46c93d6e9479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10815", "type": "seen", "source": "https://t.me/cvedetector/14787", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10815 - WordPress PostLists ostrov Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-10815 \nPublished : Jan. 9, 2025, 6:15 a.m. | 19\u00a0minutes ago \nDescription : The PostLists WordPress plugin through 2.0.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T07:43:13.000000Z"}, {"uuid": "fbfeddd6-bebc-4f92-b158-ea93bbd805fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6764", "content": "\u0418 \u0432\u043d\u043e\u0432\u044c \u0447\u0435\u0440\u043d\u0430\u044f (\u043a\u043e\u0440\u0438\u0447\u043d\u0435\u0432\u0430\u044f) \u043f\u043e\u043b\u043e\u0441\u0430 \u0432 \u0436\u0438\u0437\u043d\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 Palo Alto Networks \u0438 Ivanti.\n\n\u0423 \u043f\u0435\u0440\u0432\u044b\u0445 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 PAN-OS\u2019\u043e\u043c, \u0442\u0435\u043f\u0435\u0440\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 (CVE-2025-0111) \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u0430 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u0430\u0442\u0430\u043a \u0441 \u0434\u0432\u0443\u043c\u044f \u0434\u0440\u0443\u0433\u0438\u043c\u0438 CVE-2025-0108 \u0438 CVE-2024-9474 \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 \u0432 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 CVE-2025-0108 12 \u0444\u0435\u0432\u0440\u0430\u043b\u044f, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0412 \u0442\u043e\u0442 \u0436\u0435 \u0434\u0435\u043d\u044c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Assetnote\u00a0\u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 PoC,\u00a0\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0438\u0439, \u043a\u0430\u043a CVE-2025-0108 \u0438 CVE-2024-9474 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 root \u043d\u0430 \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445 PAN-OS.\n\nCVE-2024-9474 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 PAN-OS, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u043d\u043e\u044f\u0431\u0440\u0435 2024 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0443 PAN-OS \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043d\u0430 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root. \u0423\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 0-day \u043d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f.\n\n\u0414\u043d\u0435\u043c \u043f\u043e\u0437\u0436\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f GreyNoise \u043d\u0430\u0447\u0430\u043b\u0430 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u043a\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438\u00a0\u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0438\u043b\u0438 \u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u043b\u0438\u0441\u044c \u0441 \u0434\u0432\u0443\u0445 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432.\n\n\u0417\u0430\u0442\u0435\u043c \u043c\u0430\u0441\u0448\u0442\u0430\u0431 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0438\u043b\u0441\u044f, \u043d\u043e \u0438, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c GreyNoise, \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u0432\u043e\u0437\u0440\u043e\u0441\u043b\u0430.\n\nGreyNoise \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0442\u0435\u043f\u0435\u0440\u044c\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e 25 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 CVE-2025-0108, \u0442\u043e\u0433\u0434\u0430 \u043a\u0430\u043a \u0432 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043e\u0442 13 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0431\u044b\u043b\u043e \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u0432\u0430. \u041e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0430\u043c\u0438 \u0430\u0442\u0430\u043a \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0421\u0428\u0410, \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u044f \u0438 \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u044b.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c Macnica \u042e\u0442\u0430\u043a\u0430 \u0421\u044d\u0434\u0437\u0438\u044f\u043c\u0430 \u0432\u044b\u044f\u0432\u0438\u043b \u0442\u044b\u0441\u044f\u0447\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 PAN-OS, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442 \u0441\u0432\u043e\u0439 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CVE-2025-0108 \u0438 CVE-2025-0111, \u0442\u043e \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442 \u0441\u0432\u043e\u0439 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439. \u0418\u0437 3490 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438\u0441\u044c.\n\n\u0418\u0437 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 1168 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 CVE-2025-0108 \u0438 CVE-2025-0111, \u043d\u043e \u0438\u043c\u0435\u044e\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f CVE-2024-9474.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0441\u043e\u043e\u0431\u0449\u0438\u043b, \u0447\u0442\u043e \u043f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 \u0432 \u043f\u0440\u0438\u0437\u043c\u0435 \u0432\u0441\u0435\u0445 \u0442\u0440\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0430\u0442\u0430\u043a\u0430\u043c\u0438, 65% (2262 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430) \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0438\u0437 \u043d\u0438\u0445.\n\n\u041f\u043e Ivanti \u0432\u0441\u0435 \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e: \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 CVE-2024-10811, CVE-2024-13161, CVE-2024-13160 \u0438 CVE-2024-13159 (CVSS 9,8) \u0432 Ivanti Endpoint Manager (EPM) \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Horizon3.ai \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0438\u0441\u044c PoC.\n\n\u042d\u0442\u043e \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0434\u043b\u044f \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u043c\u0430\u0448\u0438\u043d\u044b Ivanti EPM \u0432 \u0440\u0435\u0442\u0440\u0430\u043d\u0441\u043b\u044f\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u0437\u0430\u0442\u0435\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 EPM.", "creation_timestamp": "2025-02-20T18:30:05.000000Z"}, {"uuid": "5352ff4a-771a-4bd8-8739-68cbc68e063b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "https://t.me/true_secator/6633", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Ivanti \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Avalanche, Application Control Engine \u0438 EPM.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0447\u0435\u0442\u044b\u0440\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u0443\u0442\u0438 \u0432 Ivanti EPM, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\nCVE-2024-10811, CVE-2024-13159 - CVE-2024-13161 \u0438\u043c\u0435\u044e\u0442 9,8 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 EMP 2024 \u0438 2022 SU6 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u043d\u043e\u044f\u0431\u0440\u044c 2024.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 12 \u0432\u044b\u0441\u043e\u043a\u043e\u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE, DoS \u0438 EoP \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0412\u044b\u043f\u0443\u0449\u0435\u043d\u0430 Avalanche 6.4.7 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 CVE-2024-13179 - CVE-2024-13181 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043a\u0440\u0430\u0436\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043d\u0435 \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430\u043c\u0438 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u0415\u0449\u0435 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e Ivanti \u0433\u043e\u0442\u043e\u0432\u0438\u0442 \u0434\u043b\u044f \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0430\u043a\u0441\u0435\u0441\u0441\u0443\u0430\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u0443\u0434\u0435\u0442 \u0440\u0430\u0441\u0441\u044b\u043b\u0430\u0442\u044c\u0441\u044f \u0432\u043c\u0435\u0441\u0442\u0435 \u0441\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c (\u0444\u043e\u0442\u043e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u043c).", "creation_timestamp": "2025-01-17T18:40:05.000000Z"}, {"uuid": "771b7ab3-6e1c-47d4-8705-77ef9f1ca2df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1081", "type": "seen", "source": "Telegram/IvHIYyp2E9Z0esodJs9OGAJvTa8fMjVeFkZ3WI1l2Lm0bXEr", "content": "", "creation_timestamp": "2025-02-06T02:42:30.000000Z"}, {"uuid": "cfa5efb1-2cae-4477-a771-470117dc7087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10811", "type": "seen", "source": "Telegram/z_eYXtyJvpKeGP6rpG_zcKkk301tgW9l7Aa28dIAfzozQ4GY", "content": "", "creation_timestamp": "2025-02-21T22:10:24.000000Z"}, {"uuid": "41cf87af-5d06-44b4-93c6-416eb8923ef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1081", "type": "seen", "source": "https://t.me/arpsyndicate/3892", "content": "#ExploitObserverAlert\n\nCVE-2024-1081\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1081. The 3D FlipBook \u2013 PDF Flipbook WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bookmark feature in all versions up to, and including, 1.15.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-22T03:37:35.000000Z"}, {"uuid": "88854179-dc2a-47ab-b057-6e5bdf1b44b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1081", "type": "seen", "source": "https://t.me/ctinow/189326", "content": "https://ift.tt/4varfZu\nCVE-2024-1081", "creation_timestamp": "2024-02-21T08:31:55.000000Z"}, {"uuid": "aa4e5b31-8476-45a6-8315-4355102a07e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1081", "type": "seen", "source": "https://t.me/ctinow/203522", "content": "https://ift.tt/lLWkBha\nCVE-2024-1081 | 3D FlipBook Plugin up to 1.15.3 on WordPress Bookmark cross site scripting", "creation_timestamp": "2024-03-08T18:56:44.000000Z"}]}