{"vulnerability": "CVE-2024-1115", "sightings": [{"uuid": "2519b271-0e7c-4cdc-880f-376d90963828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11159", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113475957411678076", "content": "", "creation_timestamp": "2024-11-13T13:48:18.513197Z"}, {"uuid": "e5496021-9508-4623-9783-81a399e78081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11150", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113473774944962970", "content": "", "creation_timestamp": "2024-11-13T04:33:16.463965Z"}, {"uuid": "79c12025-af10-4946-b80b-ca18bc112251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11159", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113476312672337095", "content": "", "creation_timestamp": "2024-11-13T15:18:39.544862Z"}, {"uuid": "d17f796d-9d6f-478f-bf17-d37e2ee594b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11154", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515638631215300", "content": "", "creation_timestamp": "2024-11-20T13:59:45.697740Z"}, {"uuid": "52513f87-b437-473a-b99a-1f90620a9600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601431903458166", "content": "", "creation_timestamp": "2024-12-05T17:38:07.301662Z"}, {"uuid": "bf9fcf70-0a96-4761-9fe7-4d1269f532fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11158", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601457861462098", "content": "", "creation_timestamp": "2024-12-05T17:44:45.673233Z"}, {"uuid": "ecb855e4-d182-41d3-b5ca-2cbc0d3d3be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11155", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601431888488988", "content": "", "creation_timestamp": "2024-12-05T17:38:06.922996Z"}, {"uuid": "29df48d9-b82c-4be6-a672-9c3a0d214420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "00126301-5175-44cb-b3de-144e10465b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1715/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}, {"uuid": "c84ec50e-79ab-4f84-b339-7618eb1b7aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11155", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "274106f6-1b17-4647-ad86-6caef5216b55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11158", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "1d893e40-2a80-41b9-8bb5-2293c161537e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1655/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "a3f7395b-be31-471f-ab59-8a8559a68b25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1654/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "1dd7b6bb-df48-4eba-a4d2-d00513015655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11155", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1653/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "2576ff72-d367-4b57-b8e3-ea04b0a02345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1652/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "0be4ce79-d0be-440d-a77d-0dbfe4193aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11158", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1650/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "f96667d7-370a-4322-b4f6-41fd2a7c55fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1649/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "3cd8c046-35a3-42ae-b566-47c4a2e02210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113681467193394883", "content": "", "creation_timestamp": "2024-12-19T20:52:08.710872Z"}, {"uuid": "7b651b7a-e974-41d1-ab23-63cb51ef7d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldos5oezoa2t", "content": "", "creation_timestamp": "2024-12-19T21:15:24.685441Z"}, {"uuid": "530a1487-2102-4983-8c22-06d4c6c2ca41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "d97e8ddb-8931-48b8-8ad4-e478543d7a13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}, {"uuid": "e36b1dd1-a11c-4f81-96d6-40781eaf1be8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11153", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6534", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11153\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: The Content Control \u2013 The Ultimate Content Restriction Plugin! Restrict Content, Create Conditional Blocks &amp; More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.0 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as logged-in users.\n\ud83d\udccf Published: 2025-03-05T11:22:10.516Z\n\ud83d\udccf Modified: 2025-03-05T11:22:10.516Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/bbe51f96-82b2-4091-acd8-a8131a47eb07?source=cve\n2. https://wordpress.org/plugins/content-control/", "creation_timestamp": "2025-03-05T11:37:34.000000Z"}, {"uuid": "df0c918b-5624-4a31-bf15-f8eb74337e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11153", "type": "seen", "source": "Telegram/ZMMuxNd6VH19r2DnCXw4Qn5UnXG-dr-gtV1joh_LQM6DL5E9", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}, {"uuid": "5554bfd5-ba46-46a5-8cc4-a8127187b5c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11153", "type": "seen", "source": "https://t.me/cvedetector/19633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11153 - WordPress Restrict Content Plugin Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-11153 \nPublished : March 5, 2025, 12:15 p.m. | 51\u00a0minutes ago \nDescription : The Content Control \u2013 The Ultimate Content Restriction Plugin! Restrict Content, Create Conditional Blocks &amp; More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.0 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as logged-in users. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T14:26:20.000000Z"}, {"uuid": "a0d606e7-3276-44a0-a978-22b25d94e954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11157", "type": "seen", "source": "https://t.me/cvedetector/13375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11157 - Rockwell Automation Arena Write-what-Where Memory Corruption (Buffer Overflow)\", \n  \"Content\": \"CVE ID : CVE-2024-11157 \nPublished : Dec. 19, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : A third-party vulnerability exists in the Rockwell Automation Arena\u00ae that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T23:10:59.000000Z"}, {"uuid": "41dd01e2-d2d2-460b-9f5c-fe5b25567dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11154", "type": "seen", "source": "https://t.me/cvedetector/11607", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11154 - WordPress PublishPress Revisions Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-11154 \nPublished : Nov. 20, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : The PublishPress Revisions: Duplicate Posts, Submit, Approve and Schedule Content Changes plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.15 via the 'actAjaxRevisionDiffs' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including revisions of posts and pages. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T16:15:09.000000Z"}, {"uuid": "e8c75901-e05e-4fd2-b1cb-b4d99c31ca2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11155", "type": "seen", "source": "https://t.me/cvedetector/12132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11155 - A \u201cuse after free\u201d code execution vulnerability e\", \n  \"Content\": \"CVE ID : CVE-2024-11155 \nPublished : Dec. 5, 2024, 6:15 p.m. | 38\u00a0minutes ago \nDescription : A \u201cuse after free\u201d  code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T20:22:54.000000Z"}, {"uuid": "78d15c51-cddb-4a60-bac8-4941654792b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11158", "type": "seen", "source": "https://t.me/cvedetector/12130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11158 - An \u201cuninitialized variable\u201d code execution vulnera\", \n  \"Content\": \"CVE ID : CVE-2024-11158 \nPublished : Dec. 5, 2024, 6:15 p.m. | 38\u00a0minutes ago \nDescription : An \u201cuninitialized variable\u201d code execution vulnerability exists in the   \n  \nRockwell Automation Arena\u00ae  \n  \n that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T20:22:53.000000Z"}, {"uuid": "5c72fef9-83d3-409c-be7b-0c20dcb21113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11156", "type": "seen", "source": "https://t.me/cvedetector/12128", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11156 - An \u201cout of bounds write\u201d code execution vulnerabi\", \n  \"Content\": \"CVE ID : CVE-2024-11156 \nPublished : Dec. 5, 2024, 6:15 p.m. | 38\u00a0minutes ago \nDescription : An \u201cout of bounds write\u201d  code execution vulnerability exists in the  \n  \nRockwell Automation Arena\u00ae  \n  \n that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T20:22:51.000000Z"}, {"uuid": "e8c82c84-4851-46ca-b93c-c06589f56be4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11159", "type": "seen", "source": "https://t.me/cvedetector/10817", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11159 - Thunderbird OpenPGP Plaintext Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11159 \nPublished : Nov. 13, 2024, 2:15 p.m. | 46\u00a0minutes ago \nDescription : Using remote content in OpenPGP encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird &lt; 128.4.3 and Thunderbird &lt; 132.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T16:23:18.000000Z"}, {"uuid": "16859ee6-ac13-47fb-a07e-4f9c1f64e445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11150", "type": "seen", "source": "https://t.me/cvedetector/10804", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11150 - WordPress User Extra Fields Remote File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11150 \nPublished : Nov. 13, 2024, 5:15 a.m. | 43\u00a0minutes ago \nDescription : The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T07:28:21.000000Z"}, {"uuid": "b2964874-31ee-44de-8ac8-3aabd4f953b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1115", "type": "seen", "source": "https://t.me/ctinow/190782", "content": "https://ift.tt/JVvPGLr\nCVE-2024-1115 | openBI up to 1.0.8 Setting.php dlfile phpPath os command injection", "creation_timestamp": "2024-02-22T15:12:32.000000Z"}, {"uuid": "8d1f2a58-ca4c-4ce3-8873-626a49c1d5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1115", "type": "seen", "source": "https://t.me/ctinow/177110", "content": "https://ift.tt/4D3mEK8\nCVE-2024-1115", "creation_timestamp": "2024-01-31T21:22:09.000000Z"}]}