{"vulnerability": "CVE-2024-1159", "sightings": [{"uuid": "d0019002-99be-4b68-9c5f-62f820e01f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11592", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113521441427235497", "content": "", "creation_timestamp": "2024-11-21T14:35:29.263543Z"}, {"uuid": "0d4d4c78-ba74-458d-8dad-319d8a7db99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11595", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113520267425150345", "content": "", "creation_timestamp": "2024-11-21T09:36:55.439526Z"}, {"uuid": "4f139215-3223-4be1-bdf4-28123024581f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11596", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113520267439239023", "content": "", "creation_timestamp": "2024-11-21T09:36:55.826432Z"}, {"uuid": "00fc031a-9963-4de0-9f0d-8623c64fde8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11591", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113521306663563862", "content": "", "creation_timestamp": "2024-11-21T14:01:12.962855Z"}, {"uuid": "74ba1239-2ddf-4afe-b61d-66289f0022f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11599", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113560012271589838", "content": "", "creation_timestamp": "2024-11-28T10:04:34.107150Z"}, {"uuid": "463b881a-12d9-4f04-97ed-3bd36f2a710b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11597", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113635239382878469", "content": "", "creation_timestamp": "2024-12-11T16:55:48.378938Z"}, {"uuid": "d7a3d302-bb9f-4cbd-bd74-b39f82c138ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11598", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113635239401293285", "content": "", "creation_timestamp": "2024-12-11T16:55:48.853404Z"}, {"uuid": "1ae05eac-d5a2-4c06-bdbd-93e7958c1d67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1159", "type": "seen", "source": "https://t.me/ctinow/199043", "content": "https://ift.tt/fwBonph\nCVE-2024-1159 | Bold Page Builder Plugin up to 4.8.0 on WordPress Raw Content cross site scripting", "creation_timestamp": "2024-03-04T07:41:21.000000Z"}, {"uuid": "7c6efe8e-d399-4ce7-8876-e1fd3c6cd490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11598", "type": "seen", "source": "https://t.me/cvedetector/12648", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11598 - Ivanti Application Control Insecure Permissions Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-11598 \nPublished : Dec. 11, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Under specific circumstances, insecure permissions in Ivanti Application Control before version 2024.3 HF1, 2024.1 HF2, or 2023.3 HF3 allows a local authenticated attacker to achieve local privilege escalation. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T18:35:07.000000Z"}, {"uuid": "86e68a4e-bf1d-40d3-ac5f-125a3a0812bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11597", "type": "seen", "source": "https://t.me/cvedetector/12647", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11597 - \"Ivanti Performance Manager Insecure Permissions Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-11597 \nPublished : Dec. 11, 2024, 5:15 p.m. | 19\u00a0minutes ago \nDescription : Under specific circumstances, insecure permissions in Ivanti Performance Manager before version 2024.3 HF1, 2024.1 HF1, or 2023.3 HF1 allows a local authenticated attacker to achieve local privilege escalation. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T18:35:06.000000Z"}, {"uuid": "a57c3027-ea1a-4b71-9b90-3bcc666ea0a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1159", "type": "seen", "source": "https://t.me/ctinow/183741", "content": "https://ift.tt/Z32PEO4\nCVE-2024-1159", "creation_timestamp": "2024-02-13T11:21:49.000000Z"}]}