{"vulnerability": "CVE-2024-1145", "sightings": [{"uuid": "313b8c0e-7b10-40b7-a8fd-26d6d00bec66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11455", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113518973666453504", "content": "", "creation_timestamp": "2024-11-21T04:07:54.375127Z"}, {"uuid": "7c419023-f119-4d7c-b0ba-9abcb60163de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11456", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113520028779491271", "content": "", "creation_timestamp": "2024-11-21T08:36:14.571817Z"}, {"uuid": "cbf42fd2-3504-4657-82aa-fc0c9e4b3cc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11450", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113605140755246070", "content": "", "creation_timestamp": "2024-12-06T09:21:20.652883Z"}, {"uuid": "35c62096-c266-48cd-8e5e-5487b653b2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11457", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113611255352925843", "content": "", "creation_timestamp": "2024-12-07T11:16:21.130323Z"}, {"uuid": "b0a9ec05-78be-495e-bc5b-a9f33b472d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11453", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113587766036825831", "content": "", "creation_timestamp": "2024-12-03T07:42:42.568279Z"}, {"uuid": "473b6855-0b74-487f-adcd-ebae6c151fae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11458", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559778969715574", "content": "", "creation_timestamp": "2024-11-28T09:05:13.792225Z"}, {"uuid": "690e1501-bbf2-4051-999f-b349ffc149d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11451", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113609125942145289", "content": "", "creation_timestamp": "2024-12-07T02:14:48.926987Z"}, {"uuid": "077bbad1-52f5-4406-865b-d1b2f3a5577e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11454", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113624135559974059", "content": "", "creation_timestamp": "2024-12-09T17:51:57.538219Z"}, {"uuid": "4b6cfeb2-f519-46c4-99bb-96e3b0ce0932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11452", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113835909107913643", "content": "", "creation_timestamp": "2025-01-16T03:28:48.444114Z"}, {"uuid": "fb316f83-373d-42b9-bc09-72910a488cb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11452", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lftg7tat3i2t", "content": "", "creation_timestamp": "2025-01-16T04:15:33.638594Z"}, {"uuid": "9f0c49e7-a9dd-4b20-9acb-16b64258a855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11452", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lftieyima62k", "content": "", "creation_timestamp": "2025-01-16T04:54:14.788774Z"}, {"uuid": "b32b781f-60c5-46a1-b012-276e255cb83d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11452", "type": "seen", "source": "https://t.me/cvedetector/15569", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11452 - WordPress Chamber Dashboard Business Directory Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11452 \nPublished : Jan. 16, 2025, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'business_categories' shortcode in all versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T06:11:54.000000Z"}, {"uuid": "d84cf152-623b-4c71-b0af-f11fac3abc32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11452", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1913", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11452\n\ud83d\udd39 Description: The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'business_categories' shortcode in all versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-01-16T03:27:21.913Z\n\ud83d\udccf Modified: 2025-01-16T03:27:21.913Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/54e5989f-3d2c-4ed3-b4c4-f2589b885637?source=cve\n2. https://plugins.trac.wordpress.org/browser/chamber-dashboard-business-directory/trunk/shortcodes/bus_cat_shortcode.php#L52\n3. https://plugins.trac.wordpress.org/changeset/3222548/", "creation_timestamp": "2025-01-16T03:55:19.000000Z"}, {"uuid": "73f3d7d8-dc0a-4fcd-9fcd-0a65e154245c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11459", "type": "seen", "source": "https://t.me/cvedetector/12719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11459 - WordPress Country Blocker Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11459 \nPublished : Dec. 12, 2024, 5:15 a.m. | 43\u00a0minutes ago \nDescription : The Country Blocker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'ip' parameter in all versions up to, and including, 3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T07:08:07.000000Z"}, {"uuid": "20245440-cf35-4816-8049-2ecee74f256e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11454", "type": "seen", "source": "https://t.me/cvedetector/12425", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11454 - Autodesk Revit DLL Loading Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11454 \nPublished : Dec. 9, 2024, 6:15 p.m. | 23\u00a0minutes ago \nDescription : A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T19:43:26.000000Z"}, {"uuid": "e653507e-0894-4039-9244-74b9f3bbfa7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11457", "type": "seen", "source": "https://t.me/cvedetector/12321", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11457 - Feedpress Generator WordPress Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11457 \nPublished : Dec. 7, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : The Feedpress Generator \u2013 External RSS Frontend Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-07T14:12:33.000000Z"}, {"uuid": "73facc3c-e7a1-4c71-aaf4-1835b1a5c3b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11451", "type": "seen", "source": "https://t.me/cvedetector/12302", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11451 - The Zooom plugin for WordPress is vulnerable to St\", \n  \"Content\": \"CVE ID : CVE-2024-11451 \nPublished : Dec. 7, 2024, 2:15 a.m. | 37\u00a0minutes ago \nDescription : The Zooom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zooom' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-07T04:10:41.000000Z"}, {"uuid": "26f7c7e2-ceb5-4966-bb4e-cb6ea6895aaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11450", "type": "seen", "source": "https://t.me/cvedetector/12187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11450 - The ONLYOFFICE Docs plugin for WordPress is vulner\", \n  \"Content\": \"CVE ID : CVE-2024-11450 \nPublished : Dec. 6, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : The ONLYOFFICE Docs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'onlyoffice' shortcode in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T10:36:03.000000Z"}, {"uuid": "5cda65d4-cc58-47c4-bf23-3c5b7b939a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11453", "type": "seen", "source": "https://t.me/cvedetector/11872", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11453 - The WordPress Pinterest Plugin \u2013 Make a Popup, Use\", \n  \"Content\": \"CVE ID : CVE-2024-11453 \nPublished : Dec. 3, 2024, 8:15 a.m. | 58\u00a0minutes ago \nDescription : The WordPress Pinterest Plugin \u2013 Make a Popup, User Profile, Masonry and Gallery Layout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gs_pin_widget' shortcode in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T10:39:00.000000Z"}, {"uuid": "19a19b56-6243-4484-ab6c-716b978af4b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1145", "type": "seen", "source": "https://t.me/ctinow/211464", "content": "https://ift.tt/Gqnet8x\nCVE-2024-1145", "creation_timestamp": "2024-03-19T13:31:19.000000Z"}, {"uuid": "7783f682-596e-44d5-865b-2b09faae82d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1145", "type": "seen", "source": "https://t.me/ctinow/211445", "content": "https://ift.tt/Gqnet8x\nCVE-2024-1145", "creation_timestamp": "2024-03-19T13:26:45.000000Z"}]}