{"vulnerability": "CVE-2024-1161", "sightings": [{"uuid": "7a450b07-5a58-4447-989a-25171bc32b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11610", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-340-01", "content": "", "creation_timestamp": "2024-12-05T11:00:00.000000Z"}, {"uuid": "0b92aac1-cda7-472c-bb15-820a320afd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11618", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528153327669422", "content": "", "creation_timestamp": "2024-11-22T19:02:25.275258Z"}, {"uuid": "af5fb8c4-38f6-48cd-bd38-e23b52d1a6a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11611", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-340-01", "content": "", "creation_timestamp": "2024-12-05T11:00:00.000000Z"}, {"uuid": "a0437290-15c2-4b07-9679-500ae17b4915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11612", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1606/", "content": "", "creation_timestamp": "2024-11-21T05:00:00.000000Z"}, {"uuid": "5fef683a-0d4a-4d01-bd1c-659ec740e56f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11611", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1675/", "content": "", "creation_timestamp": "2024-12-11T05:00:00.000000Z"}, {"uuid": "3c3c93cb-6d1f-4bc2-bcc6-cf3a4b4257d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11610", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1674/", "content": "", "creation_timestamp": "2024-12-11T05:00:00.000000Z"}, {"uuid": "7ee7a857-a2fb-4c62-ba8f-42ec352a2579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11616", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113678869039632655", "content": "", "creation_timestamp": "2024-12-19T09:51:24.096395Z"}, {"uuid": "caa9a662-2b53-42d2-895f-f536746b8a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11616", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldnnc3krqm27", "content": "", "creation_timestamp": "2024-12-19T10:15:45.074466Z"}, {"uuid": "6acbdde2-b151-4b59-9a9d-88b489465638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113672905451909939", "content": "", "creation_timestamp": "2024-12-18T08:34:47.053587Z"}, {"uuid": "57d7a788-add3-400d-93e8-13f61b515c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3ldxyqlhyuq2w", "content": "", "creation_timestamp": "2024-12-23T13:07:18.916220Z"}, {"uuid": "a626afb6-03fb-49a1-b4be-04eddca31d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://gist.github.com/chfle/295416350979cc64a6fd47273f83f33d", "content": "", "creation_timestamp": "2025-01-09T08:46:04.000000Z"}, {"uuid": "be65151d-3e9a-402a-8180-59c396374637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lf6kasm6q22d", "content": "", "creation_timestamp": "2025-01-07T21:01:49.393812Z"}, {"uuid": "f083d1d2-5e4d-4b34-aa20-bd2d7488e352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113791376006148828", "content": "", "creation_timestamp": "2025-01-08T06:43:24.144598Z"}, {"uuid": "445063e9-e686-4f2e-89cf-6c8394051eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113791390773090245", "content": "", "creation_timestamp": "2025-01-08T06:47:09.437923Z"}, {"uuid": "3ffaafd9-9da4-4276-b5da-3e0292e9c56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113791632015650454", "content": "", "creation_timestamp": "2025-01-08T07:48:30.735850Z"}, {"uuid": "1e5a5ce8-038c-4b93-8064-461e95dff591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7rqpwt2q2g", "content": "", "creation_timestamp": "2025-01-08T08:48:37.328048Z"}, {"uuid": "94640d1f-a21a-436d-971c-5c310d1ce34a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7rqravmw2i", "content": "", "creation_timestamp": "2025-01-08T08:48:42.285081Z"}, {"uuid": "9d5a53a9-6f6e-42ca-a560-a47a61c74271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad5lw7h27", "content": "", "creation_timestamp": "2025-01-20T21:02:03.132560Z"}, {"uuid": "470873d4-7727-470d-a1fd-7d844fb07710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11610", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113919160718762548", "content": "", "creation_timestamp": "2025-01-30T20:20:45.314538Z"}, {"uuid": "188976ed-408c-4685-9772-f7dc05de8170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11611", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113919160733342141", "content": "", "creation_timestamp": "2025-01-30T20:20:45.443577Z"}, {"uuid": "555c8ef4-8fbb-4d63-94cc-7213d1e17aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11610", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgynbl7xaq2g", "content": "", "creation_timestamp": "2025-01-30T23:30:23.410498Z"}, {"uuid": "5afba9d7-dc48-40ec-b353-717dbaa729cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11611", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgynbldb7j2i", "content": "", "creation_timestamp": "2025-01-30T23:30:24.016243Z"}, {"uuid": "54f970ee-37e6-4783-90f1-0ba47cf7576e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/binitamshah.bsky.social/post/3lkiv627dns22", "content": "", "creation_timestamp": "2025-03-16T14:49:41.753692Z"}, {"uuid": "078f20b9-8057-4bf9-81ea-fc233ce32bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/abrahack.bsky.social/post/3lkd6unmzik2b", "content": "", "creation_timestamp": "2025-03-14T08:27:26.161698Z"}, {"uuid": "0d0037b4-e63f-4da9-b0c7-f477b9a4050e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lklwuqfadg2x", "content": "", "creation_timestamp": "2025-03-17T19:58:15.647786Z"}, {"uuid": "a36df2be-e676-42e6-a95f-7abb8994603c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12175", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11614\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_0, Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.\n\ud83d\udccf Published: 2024-12-18T08:30:49.729Z\n\ud83d\udccf Modified: 2025-04-17T00:31:34.768Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0208\n2. https://access.redhat.com/errata/RHSA-2025:0209\n3. https://access.redhat.com/errata/RHSA-2025:0210\n4. https://access.redhat.com/errata/RHSA-2025:0211\n5. https://access.redhat.com/errata/RHSA-2025:0220\n6. https://access.redhat.com/errata/RHSA-2025:0221\n7. https://access.redhat.com/errata/RHSA-2025:0222\n8. https://access.redhat.com/errata/RHSA-2025:3963\n9. https://access.redhat.com/errata/RHSA-2025:3964\n10. https://access.redhat.com/errata/RHSA-2025:3965\n11. https://access.redhat.com/errata/RHSA-2025:3970\n12. https://access.redhat.com/security/cve/CVE-2024-11614\n13. https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "creation_timestamp": "2025-04-17T00:59:45.000000Z"}, {"uuid": "1121d816-403d-4246-827d-3e24c8a70e5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5486", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11614\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_0, Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.\n\ud83d\udccf Published: 2024-12-18T08:30:49.729Z\n\ud83d\udccf Modified: 2025-02-26T11:56:36.361Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0208\n2. https://access.redhat.com/errata/RHSA-2025:0209\n3. https://access.redhat.com/errata/RHSA-2025:0210\n4. https://access.redhat.com/errata/RHSA-2025:0211\n5. https://access.redhat.com/errata/RHSA-2025:0220\n6. https://access.redhat.com/errata/RHSA-2025:0221\n7. https://access.redhat.com/errata/RHSA-2025:0222\n8. https://access.redhat.com/security/cve/CVE-2024-11614\n9. https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "creation_timestamp": "2025-02-26T12:31:55.000000Z"}, {"uuid": "f39b33c9-c1d3-4ff7-b9f2-9456844f1a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/676", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11613\n\ud83d\udd39 Description: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.\n\ud83d\udccf Published: 2025-01-08T06:41:36.482Z\n\ud83d\udccf Modified: 2025-01-08T06:41:36.482Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/31052fe6-a0ae-4502-b2d2-dbc3b3bf672f?source=cve\n2. https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php\n3. https://plugins.trac.wordpress.org/changeset/3217005/", "creation_timestamp": "2025-01-08T07:39:27.000000Z"}, {"uuid": "45c8d6fb-00ab-43d8-b209-024ffa630f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11614\n\ud83d\udd39 Description: An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.\n\ud83d\udccf Published: 2024-12-18T08:30:49.729Z\n\ud83d\udccf Modified: 2025-01-09T17:03:59.375Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0208\n2. https://access.redhat.com/errata/RHSA-2025:0209\n3. https://access.redhat.com/errata/RHSA-2025:0210\n4. https://access.redhat.com/errata/RHSA-2025:0220\n5. https://access.redhat.com/errata/RHSA-2025:0221\n6. https://access.redhat.com/errata/RHSA-2025:0222\n7. https://access.redhat.com/security/cve/CVE-2024-11614\n8. https://bugzilla.redhat.com/show_bug.cgi?id=2327955", "creation_timestamp": "2025-01-09T17:17:32.000000Z"}, {"uuid": "85727af0-081d-4030-a920-9c83677ed50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11611", "type": "seen", "source": "https://t.me/cvedetector/16842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11611 - AutomationDirect C-More EA9 EAP9 Remote Code Execution Zero-Day Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11611 \nPublished : Jan. 30, 2025, 9:15 p.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T01:08:47.000000Z"}, {"uuid": "2d9fdbbc-6e10-4798-b2ca-b1c526849f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11617", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15757", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11617\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-05-09T06:42:35.817Z\n\ud83d\udccf Modified: 2025-05-09T16:15:53.245Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/d0ad02d9-546f-4bcb-b567-785e3acfb489?source=cve\n2. https://themeforest.net/item/envolve-consulting-business-wordpress-theme/28748459", "creation_timestamp": "2025-05-09T16:24:54.000000Z"}, {"uuid": "ea6adbf4-9d81-4156-9cb7-ed7b6641b434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11610", "type": "seen", "source": "https://t.me/cvedetector/16841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11610 - AutomationDirect C-More EA9 EAP9 File Parsing Remote Code Execution Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-11610 \nPublished : Jan. 30, 2025, 9:15 p.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24773. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T01:08:47.000000Z"}, {"uuid": "c8e7fa47-bf55-40f9-82d0-6eb7deb38ecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11613", "type": "seen", "source": "https://t.me/cvedetector/14666", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11613 - WordPress File Upload Plugin Remote Code Execution and File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11613 \nPublished : Jan. 8, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T09:07:37.000000Z"}, {"uuid": "9044857f-e24c-4f58-8138-f640cb9526d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11616", "type": "seen", "source": "https://t.me/cvedetector/13316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11616 - Netskope Endpoint DLP Double-Fetch Heap Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11616 \nPublished : Dec. 19, 2024, 10:15 a.m. | 42\u00a0minutes ago \nDescription : Netskope was made aware of a security vulnerability in Netskope Endpoint DLP\u2019s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes\u00a0argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction\u00a0function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory\u00a0call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.  \nThis issue affects Endpoint DLP version below R119. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T12:18:37.000000Z"}, {"uuid": "01cdc90a-b8fe-4390-a1df-1e646abb186d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11614", "type": "seen", "source": "https://t.me/cvedetector/13176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11614 - DPDK Vhost Library Virtio Descriptor OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11614 \nPublished : Dec. 18, 2024, 9:15 a.m. | 41\u00a0minutes ago \nDescription : An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T11:11:02.000000Z"}, {"uuid": "b670f82e-b632-49bb-a088-56d34bf10dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11615", "type": "seen", "source": "https://t.me/cvedetector/24472", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11615 - WordPress Envolve Plugin File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11615 \nPublished : May 5, 2025, 5:18 p.m. | 17\u00a0minutes ago \nDescription : The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.0 via the 'zetra_deleteLanguageFile' and 'zetra_deleteFontsFile' functions. This is due to the plugin not properly validating a file or its path prior to deleting it. This makes it possible for unauthenticated attackers to delete language files. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:53.000000Z"}]}