{"vulnerability": "CVE-2024-1096", "sightings": [{"uuid": "35b8ce29-cce1-4826-b4d6-1628883d2723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442553936741151", "content": "", "creation_timestamp": "2024-11-07T16:13:21.665546Z"}, {"uuid": "ab4917cc-926e-4081-911f-74e6a393e7c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10964", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442755332990789", "content": "", "creation_timestamp": "2024-11-07T17:04:34.737369Z"}, {"uuid": "fa7d3a9b-c30b-47fe-b49f-75772bf78c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10965", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113442755348402485", "content": "", "creation_timestamp": "2024-11-07T17:04:35.170895Z"}, {"uuid": "6dc75149-f9ce-447b-be0c-96e554119e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10966", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113443005811169981", "content": "", "creation_timestamp": "2024-11-07T18:08:16.743663Z"}, {"uuid": "2d443f8a-15ff-43fb-8963-3eb9ca4d0c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10967", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113443005844825463", "content": "", "creation_timestamp": "2024-11-07T18:08:17.343491Z"}, {"uuid": "bf8d59a7-6396-48b0-aa41-2a008a8c3c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10968", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113443349144692614", "content": "", "creation_timestamp": "2024-11-07T19:35:35.598143Z"}, {"uuid": "13ad0bf7-6549-4acf-803b-b16e8b854219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10969", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113443481382170117", "content": "", "creation_timestamp": "2024-11-07T20:09:13.601970Z"}, {"uuid": "f62fd6be-29ff-42cb-8ce6-a3d4bcbccdd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10961", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113530285014163260", "content": "", "creation_timestamp": "2024-11-23T04:04:31.943113Z"}, {"uuid": "00afc947-b041-4a40-a2e7-ad27f7f9dbe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990650232539553", "content": "", "creation_timestamp": "2025-02-12T11:21:27.467601Z"}, {"uuid": "86faf4a9-4641-4191-80b6-b543d8f37cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhy5nkwb3e2d", "content": "", "creation_timestamp": "2025-02-12T12:15:53.012388Z"}, {"uuid": "af78a03b-5462-46c0-9655-139d9384ad6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113991464193562064", "content": "", "creation_timestamp": "2025-02-12T14:48:29.915729Z"}, {"uuid": "05128f38-8a43-4b07-94e1-868536fced9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yozcrbd2n", "content": "", "creation_timestamp": "2025-02-13T15:25:13.419746Z"}, {"uuid": "732b4d60-a868-402a-8841-5e74a751dac6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsxpjge2a", "content": "", "creation_timestamp": "2025-02-13T02:02:08.459799Z"}, {"uuid": "ca7bcfb1-4bac-4ad0-8caf-0252d1d69c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lik3rtwjzx2v", "content": "", "creation_timestamp": "2025-02-19T15:30:25.097373Z"}, {"uuid": "47a6197c-34d6-4380-8f5c-1f5058ad6279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4081", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10960\n\ud83d\udd25 CVSS Score: 10 (CVSS_V3)\n\ud83d\udd39 Description: The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'storeUploads' function in all versions up to, and including, 2.6.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-02-12T12:30:48Z\n\ud83d\udccf Modified: 2025-02-12T12:30:48Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10960\n2. https://plugins.trac.wordpress.org/changeset/3222672/brizy/tags/2.6.5/editor/zip/archiver.php\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/2f0c85f4-07ae-4a2b-bd82-93467e7d9325?source=cve", "creation_timestamp": "2025-02-12T13:10:33.000000Z"}, {"uuid": "374fb0bd-8e88-454f-ab49-1d76cdfe2fb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m3ayfyuasw2c", "content": "", "creation_timestamp": "2025-10-15T19:34:49.398029Z"}, {"uuid": "25e1ff29-a296-4c4d-9e61-e6295b07e70a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m3ayfzacav2l", "content": "", "creation_timestamp": "2025-10-15T19:34:50.381700Z"}, {"uuid": "919999c2-820f-4253-8baa-b26d9d1ecd95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m3ayfzsd3g24", "content": "", "creation_timestamp": "2025-10-15T19:34:52.324966Z"}, {"uuid": "440538f8-f8c5-438b-bf49-0d7845e45064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10961", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9153", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10961 Authentication Bypass Using an Alternate Path or Channel (CWE-288)\nURL\uff1ahttps://github.com/FoKiiin/CVE-2024-10961\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-23T19:13:56.000000Z"}, {"uuid": "e540bf94-c5eb-44df-a0a7-bb2f26fcfac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10964", "type": "seen", "source": "https://t.me/cvedetector/10104", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10964 - Emqx Neuron Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10964 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. Affected is the function handle_add_plugin in the library cmd.library of the file plugins/restful/plugin_handle.c. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:35.000000Z"}, {"uuid": "d6be0c0f-d1eb-458d-89b7-5258a668de9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10962", "type": "seen", "source": "https://t.me/cvedetector/10957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10962 - WordPress WPvivid Plugin PHP Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10962 \nPublished : Nov. 14, 2024, 2:15 p.m. | 28\u00a0minutes ago \nDescription : The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T15:49:26.000000Z"}, {"uuid": "288677a1-1a01-4521-9186-ab95017553b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10969", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16452", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10969\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm/pwd leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2024-11-07T20:00:06.258Z\n\ud83d\udccf Modified: 2025-05-15T06:29:04.410Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.283418\n2. https://vuldb.com/?ctiid.283418\n3. https://vuldb.com/?submit.437416\n4. https://github.com/ppp-src/CVE/issues/31\n5. https://1000projects.org/", "creation_timestamp": "2025-05-15T06:33:22.000000Z"}, {"uuid": "6498a8ca-faa9-4072-ab82-2151ab993f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "https://t.me/cvedetector/17858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10960 - Brizy WordPress Unauthenticated Remote File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10960 \nPublished : Feb. 12, 2025, 12:15 p.m. | 38\u00a0minutes ago \nDescription : The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'storeUploads' function in all versions up to, and including, 2.6.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T14:22:16.000000Z"}, {"uuid": "c005de27-bb10-402d-82b7-f36609108645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10967", "type": "seen", "source": "https://t.me/cvedetector/10116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10967 - Code-projects E-Health Care System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10967 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : A vulnerability was found in code-projects E-Health Care System 1.0. It has been classified as critical. Affected is an unknown function of the file /Doctor/delete_user_appointment_request.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:04.000000Z"}, {"uuid": "d288453c-25bd-440f-bbf2-ce615cb68c69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10968", "type": "seen", "source": "https://t.me/cvedetector/10126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10968 - Apache 1000 Projects Bookstore Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10968 \nPublished : Nov. 7, 2024, 8:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T21:57:27.000000Z"}, {"uuid": "24213c56-3b99-4c7f-bf97-fda4ced66719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10969", "type": "seen", "source": "https://t.me/cvedetector/10127", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10969 - \"1000 Projects Bookstore Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10969 \nPublished : Nov. 7, 2024, 8:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T21:57:28.000000Z"}, {"uuid": "ba1233c7-6ede-427d-85e1-bd100cb29d89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10966", "type": "seen", "source": "https://t.me/cvedetector/10115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10966 - TOTOLINK X18 Os Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10966 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected by this issue is some unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:16:59.000000Z"}, {"uuid": "a3ab94eb-c44e-4b17-bf08-a7b7aba02d3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10965", "type": "seen", "source": "https://t.me/cvedetector/10105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10965 - Emqx Neuron JSON File Handler Unauthorised Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-10965 \nPublished : Nov. 7, 2024, 5:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in emqx neuron up to 2.10.0. Affected by this vulnerability is an unknown functionality of the file /api/v2/schema of the component JSON File Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The patch is named c9ce39747e0372aaa2157b2b56174914a12c06d8. It is recommended to apply a patch to fix this issue. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T18:36:36.000000Z"}, {"uuid": "adc4153e-cec5-4c6a-bf58-6f88c1e4dd61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10963", "type": "seen", "source": "https://t.me/cvedetector/10096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10963 - \"Apache pam_access Hostname Spoofing Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10963 \nPublished : Nov. 7, 2024, 4:15 p.m. | 25\u00a0minutes ago \nDescription : A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T17:46:19.000000Z"}, {"uuid": "5da1d6b2-1d5d-4393-a9a9-0643203cd60d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "Telegram/MJxqHxGHlWJ_rU8OVbtfd8Atv8BeKt0_0-Q-qXsN-EAOPB_X", "content": "", "creation_timestamp": "2025-02-20T23:26:55.000000Z"}, {"uuid": "d5927335-bf93-4d35-84a8-e89b5e51bc85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1096", "type": "seen", "source": "https://t.me/ctinow/183926", "content": "https://ift.tt/n6YU8mV\nCVE-2024-1096", "creation_timestamp": "2024-02-13T16:22:13.000000Z"}, {"uuid": "ff8d35a1-6d52-489e-98f3-82f12cc0b9ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10960", "type": "seen", "source": "Telegram/_nAxk1o0rT-f3bExmFzbVrd5JpEFYzMvW8XmS0SyKdPy-qBz", "content": "", "creation_timestamp": "2025-02-14T10:04:58.000000Z"}]}