{"vulnerability": "CVE-2024-11094", "sightings": [{"uuid": "b41afc72-dacf-420a-b067-57a7ce61600f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11094", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113491970843217453", "content": "", "creation_timestamp": "2024-11-16T09:40:43.939695Z"}, {"uuid": "d62106a7-6cb9-49d4-ad30-6642464f3da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11094", "type": "seen", "source": "https://t.me/cvedetector/11230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11094 - WordPress 404 Solution Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-11094 \nPublished : Nov. 16, 2024, 10:15 a.m. | 36\u00a0minutes ago \nDescription : The 404 Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35.17 via the export feature. This makes it possible for unauthenticated attackers to extract sensitive data such as redirects including GET parameters which may reveal sensitive information. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T11:53:19.000000Z"}]}