{"vulnerability": "CVE-2024-1113", "sightings": [{"uuid": "9290e60d-6289-4b05-8aaa-33fa64b5386e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11130", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113470620573835270", "content": "", "creation_timestamp": "2024-11-12T15:11:04.990310Z"}, {"uuid": "bfd553bb-1c32-4eed-aba7-f88b5d39d586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11136", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482015447829427", "content": "", "creation_timestamp": "2024-11-14T15:28:56.752945Z"}, {"uuid": "68b2bafb-a14a-4c88-a023-d3cd92208e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113842814214786948", "content": "", "creation_timestamp": "2025-01-17T08:44:48.969333Z"}, {"uuid": "73eb1e5d-0392-4de4-ba89-e782284c0b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfwhgxt3nl2r", "content": "", "creation_timestamp": "2025-01-17T09:15:26.221422Z"}, {"uuid": "5cb60b27-9085-446b-9f65-d1e590656418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfwj22f5vq2r", "content": "", "creation_timestamp": "2025-01-17T09:44:01.253176Z"}, {"uuid": "c39a4d52-5c24-4edd-873f-a422add35666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113843982218783924", "content": "", "creation_timestamp": "2025-01-17T13:41:51.565721Z"}, {"uuid": "ac857df5-e48b-493c-ac19-fdbf42787e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113904088135878947", "content": "", "creation_timestamp": "2025-01-28T04:27:39.027995Z"}, {"uuid": "c2809ba9-fb6c-47f1-8a9a-f1a5d25f5eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrp6kuf5f2f", "content": "", "creation_timestamp": "2025-01-28T05:15:47.237101Z"}, {"uuid": "cb9f8e94-110a-4cb7-9944-61779c304f99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11132", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941608965503951", "content": "", "creation_timestamp": "2025-02-03T19:29:37.179167Z"}, {"uuid": "c06c79cf-941e-4a46-8906-9dbbd5f446df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11134", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941608994890609", "content": "", "creation_timestamp": "2025-02-03T19:29:37.629871Z"}, {"uuid": "6ffd2e79-cc97-452a-94ed-140caaa80e64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11133", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941608980679606", "content": "", "creation_timestamp": "2025-02-03T19:29:37.415856Z"}, {"uuid": "e34ff028-9ef0-4269-9fff-a992e15d0855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11132", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhcebxhnmr2t", "content": "", "creation_timestamp": "2025-02-03T20:16:05.326165Z"}, {"uuid": "185da7e9-0a0b-48c2-8ea7-7f335f5ab940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11133", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhcec2fglz2t", "content": "", "creation_timestamp": "2025-02-03T20:16:08.411134Z"}, {"uuid": "b19040c0-94d7-452e-aaee-55067f7d9562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11134", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhcec52qjv2r", "content": "", "creation_timestamp": "2025-02-03T20:16:11.241570Z"}, {"uuid": "5b069b6b-e76e-4942-ac4c-730177e68299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgsjg5i3fs2e", "content": "", "creation_timestamp": "2025-01-28T13:05:21.832801Z"}, {"uuid": "eb393354-79ed-4da5-97a8-d8836be693fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-05", "content": "", "creation_timestamp": "2025-01-23T11:00:00.000000Z"}, {"uuid": "66079e9b-6c9a-4660-89f3-a868b1f104c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkrbxqswr42p", "content": "", "creation_timestamp": "2025-03-19T23:00:07.196436Z"}, {"uuid": "d12b5025-91b7-45fd-9635-8c9adc5e8594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqd272o27", "content": "", "creation_timestamp": "2025-03-19T11:00:10.882770Z"}, {"uuid": "3df29374-a197-47ba-958c-b4a49ea27629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkpb5wkmgw2u", "content": "", "creation_timestamp": "2025-03-19T03:40:21.176526Z"}, {"uuid": "3a231a8d-9ce5-4781-a9a8-db0202da6cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114189084185897855", "content": "", "creation_timestamp": "2025-03-19T12:25:49.648154Z"}, {"uuid": "07628d69-c501-4bde-b8e0-1cd71cf141d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114187049237511401", "content": "", "creation_timestamp": "2025-03-19T03:48:18.593685Z"}, {"uuid": "b796a8d2-96f7-4d77-851f-8030394a49ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkphjebftk24", "content": "", "creation_timestamp": "2025-03-19T05:34:07.142624Z"}, {"uuid": "4db6e8ea-09b6-4029-bafa-0603bd12159c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2109", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11139\n\ud83d\udd39 Description: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that\ncould allow local attackers to exploit these issues to potentially execute arbitrary code when opening a\nmalicious project file.\n\ud83d\udccf Published: 2025-01-17T08:37:24.886Z\n\ud83d\udccf Modified: 2025-01-17T08:37:24.886Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-09&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-014-09.pdf", "creation_timestamp": "2025-01-17T08:56:59.000000Z"}, {"uuid": "b34be191-ffca-4556-b1a4-e0c11a78fac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lq6x6e34au2x", "content": "", "creation_timestamp": "2025-05-28T00:30:11.066713Z"}, {"uuid": "eff99553-e7e6-4bda-ba44-b960d244086d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "bcdd477e-465b-49fe-960a-ecb380912149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-216/", "content": "", "creation_timestamp": "2025-04-09T03:00:00.000000Z"}, {"uuid": "e2958173-8579-4246-9c49-6b1e0f98d190", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "f1b4ae16-690e-4627-bd2c-db787d34e342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11134", "type": "seen", "source": "https://t.me/cvedetector/17116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11134 - WordPress Eventer Plugin Unauthenticated Data Exfiltration\", \n  \"Content\": \"CVE ID : CVE-2024-11134 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'eventer_export_bookings_csv' function in all versions up to, and including, 3.9.9. This makes it possible for authenticated attackers with subscriber-level permissions or above, to download bookings, which contains customers' personal data. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T22:00:18.000000Z"}, {"uuid": "4a6941c0-f21a-41e6-8d91-47049ffffaf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://t.me/cvedetector/20615", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11131 - Synology Camera Firmware Out-of-Bounds Read Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11131 \nPublished : March 19, 2025, 3:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A vulnerability regarding out-of-bounds read is found in the video interface. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.2.0-0525 may be affected: BC500, CC400W and TC500. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T06:17:16.000000Z"}, {"uuid": "5b9fb90b-eae1-42f3-b36f-f5e1123d6a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11135\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: The Eventer plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'eventer_get_attendees' function in all versions up to, and including, 3.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-28T06:30:40Z\n\ud83d\udccf Modified: 2025-01-28T06:30:40Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-11135\n2. https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/a8dc0712-f78e-46c5-a0d1-2db752498d54?source=cve", "creation_timestamp": "2025-01-28T07:08:39.000000Z"}, {"uuid": "c13fd19e-484a-45e3-9b1e-5ac349edbfca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11131", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8009", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11131\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability regarding out-of-bounds read is found in the video interface. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.2.0-0525 may be affected: BC500, CC400W and TC500.\n\ud83d\udccf Published: 2025-03-19T02:15:27.507Z\n\ud83d\udccf Modified: 2025-03-19T02:15:27.507Z\n\ud83d\udd17 References:\n1. https://www.synology.com/en-global/security/advisory/Synology_SA_24_24", "creation_timestamp": "2025-03-19T02:49:20.000000Z"}, {"uuid": "102c1b04-de16-4393-8601-40e05b53bd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://t.me/cvedetector/16584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11135 - Eventer for WordPress SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-11135 \nPublished : Jan. 28, 2025, 5:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : The Eventer plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'eventer_get_attendees' function in all versions up to, and including, 3.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T08:45:36.000000Z"}, {"uuid": "257089e1-8b39-4f60-8626-537623c712b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11133", "type": "seen", "source": "https://t.me/cvedetector/17115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11133 - WordPress Eventer Plugin File Inclusion Unauthorized Data Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11133 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handle_pdf_download_request' function in all versions up to, and including, 3.9.9. This makes it possible for unauthenticated attackers to download event tickets. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T22:00:18.000000Z"}, {"uuid": "9d0bc80a-f9de-419e-b060-b7d8f923c51a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11132", "type": "seen", "source": "https://t.me/cvedetector/17114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11132 - WordPress Eventer Plugin Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11132 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : The Eventer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T22:00:14.000000Z"}, {"uuid": "2273349b-7a3a-44a2-b70e-06053eaed2da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11139", "type": "seen", "source": "https://t.me/cvedetector/15694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11139 - Autodesk AutoCAD Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11139 \nPublished : Jan. 17, 2025, 9:15 a.m. | 40\u00a0minutes ago \nDescription : CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that  \ncould allow local attackers to exploit these issues to potentially execute arbitrary code when opening a  \nmalicious project file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T10:56:18.000000Z"}, {"uuid": "8a932ac3-d01f-4d99-86d7-4fbb985a4aea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11136", "type": "seen", "source": "https://t.me/cvedetector/10970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11136 - TCL Camera Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11136 \nPublished : Nov. 14, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user\u2019s external storage. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T18:20:03.000000Z"}, {"uuid": "d6c4ca73-cc05-4093-aa96-b9910447e63d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11130", "type": "seen", "source": "https://t.me/cvedetector/10630", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11130 - ZZCMS Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11130 \nPublished : Nov. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T17:12:52.000000Z"}, {"uuid": "7b48445c-ea33-4fda-838c-af31c23fce73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11135", "type": "seen", "source": "https://t.me/codeb0ss/1667", "content": "CVE-2024-11135", "creation_timestamp": "2025-01-27T19:52:21.000000Z"}, {"uuid": "bf7b21c3-9f01-4dd9-91ae-82cee976948b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1113", "type": "seen", "source": "https://t.me/ctinow/190762", "content": "https://ift.tt/ZcXiQjq\nCVE-2024-1113 | openBI up to 1.0.8 Unity.php uploadUnity file unrestricted upload", "creation_timestamp": "2024-02-22T14:42:18.000000Z"}, {"uuid": "9cf4a2ab-8a32-452c-a555-4a5320a456ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1113", "type": "seen", "source": "https://t.me/ctinow/177108", "content": "https://ift.tt/h6YDj7d\nCVE-2024-1113", "creation_timestamp": "2024-01-31T21:22:07.000000Z"}]}