{"vulnerability": "CVE-2024-1110", "sightings": [{"uuid": "7f7e9216-4f08-4d3b-8a63-a7bfc591f588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11101", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113468025403373235", "content": "", "creation_timestamp": "2024-11-12T04:11:05.454019Z"}, {"uuid": "f6d10937-c152-47a5-941f-b9ac4169f32a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11102", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113468025418265734", "content": "", "creation_timestamp": "2024-11-12T04:11:05.735785Z"}, {"uuid": "90eaece1-b3a6-40da-9d2e-cc33718773f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113560012257677452", "content": "", "creation_timestamp": "2024-11-28T10:04:33.502529Z"}, {"uuid": "33294274-ac94-4654-8cee-570cc06b721e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11104", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113525011763237452", "content": "", "creation_timestamp": "2024-11-22T05:43:28.798099Z"}, {"uuid": "302dd69a-7e72-4f9f-802e-2e3441660c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11107", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113627002401897515", "content": "", "creation_timestamp": "2024-12-10T06:01:01.887347Z"}, {"uuid": "f3aa6510-45cd-4f79-bbb9-39c70552980b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11106", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113628229638623108", "content": "", "creation_timestamp": "2024-12-10T11:13:08.212144Z"}, {"uuid": "38271db5-31ad-4a6b-8c60-24063bd08ebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11108", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldpqdtzba725", "content": "", "creation_timestamp": "2024-12-20T06:15:43.679527Z"}, {"uuid": "2faeacad-a4c3-4767-aee0-0df7645bae04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-111053", "type": "seen", "source": "https://mastodon.social/users/bagder/statuses/113657205050547339", "content": "", "creation_timestamp": "2024-12-15T14:02:00.694959Z"}, {"uuid": "40379958-5139-4f65-a657-363d599ed8e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11108", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113683628356774178", "content": "", "creation_timestamp": "2024-12-20T06:01:45.754356Z"}, {"uuid": "466a1444-def2-4039-ba18-f6c6c0f6c8a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11108", "type": "seen", "source": "https://t.me/cvedetector/13413", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11108 - Serious Slider WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11108 \nPublished : Dec. 20, 2024, 6:15 a.m. | 42\u00a0minutes ago \nDescription : The Serious Slider WordPress plugin before 1.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T08:23:02.000000Z"}, {"uuid": "511474c4-710f-4e21-bd0d-9a958692508d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11107", "type": "seen", "source": "https://t.me/cvedetector/12481", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11107 - WordPress System Dashboard Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-11107 \nPublished : Dec. 10, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T08:16:30.000000Z"}, {"uuid": "834faafd-191f-4551-b33c-109154887ebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11106", "type": "seen", "source": "https://t.me/cvedetector/12491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11106 - \"WordPress Simple Restrict Sensitive Information Exposure\"\", \n  \"Content\": \"CVE ID : CVE-2024-11106 \nPublished : Dec. 10, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T13:17:26.000000Z"}, {"uuid": "a786943a-c8a7-474b-938d-612932c47889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11102", "type": "seen", "source": "https://t.me/cvedetector/10577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11102 - SourceCodester Hospital Management System Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11102 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Hospital Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /vm/doctor/edit-doc.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:36.000000Z"}, {"uuid": "5b97e8aa-6218-4e5e-917a-458e0450c21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11100", "type": "seen", "source": "https://t.me/cvedetector/10583", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11100 - \"1000 Projects Beauty Parlour Management System SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-11100 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:47.000000Z"}, {"uuid": "056e1357-829a-4198-8d72-b4a2b971037b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11101", "type": "seen", "source": "https://t.me/cvedetector/10576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11101 - 1000 Projects Beauty Parlour Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11101 \nPublished : Nov. 12, 2024, 4:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T06:19:36.000000Z"}, {"uuid": "2e76c21f-07b6-4849-9ba7-7f5cf19a0882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1110", "type": "seen", "source": "https://t.me/ctinow/197804", "content": "https://ift.tt/LvhX62W\nCVE-2024-1110 | Podlove Podcast Publisher Plugin up to 4.0.11 on WordPress Setting Import authorization", "creation_timestamp": "2024-03-01T17:17:17.000000Z"}, {"uuid": "d502686b-ce3b-4a24-95c1-d40fa9bfdbe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1110", "type": "seen", "source": "https://t.me/ctinow/180658", "content": "https://ift.tt/JarZNbY\nCVE-2024-1110", "creation_timestamp": "2024-02-07T12:21:57.000000Z"}]}