{"vulnerability": "CVE-2024-1191", "sightings": [{"uuid": "31a47de9-5a2f-490f-9ce6-597d1579b44f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11918", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559133291273413", "content": "", "creation_timestamp": "2024-11-28T06:21:01.623197Z"}, {"uuid": "3d39d4eb-3ce1-48c5-8175-4fc223a5247e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11914", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637925645962924", "content": "", "creation_timestamp": "2024-12-12T04:18:57.529219Z"}, {"uuid": "0272c3bd-c86d-4cb8-a40a-de4cb0a83fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11910", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644600395418483", "content": "", "creation_timestamp": "2024-12-13T08:36:26.732537Z"}, {"uuid": "2894a60b-d415-4c1a-a45b-c4d0a5866403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11911", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644659398327965", "content": "", "creation_timestamp": "2024-12-13T08:51:26.558311Z"}, {"uuid": "4580d6d7-6b28-44b8-951e-3d1e874f49bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11915", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113808596722275422", "content": "", "creation_timestamp": "2025-01-11T07:42:51.408367Z"}, {"uuid": "6212deee-f8b6-4b65-85b6-d29c566c03b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11915", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhbcyauow2d", "content": "", "creation_timestamp": "2025-01-11T08:15:54.118350Z"}, {"uuid": "dcc33453-02b7-4f5a-83b6-8c15c863e948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11915", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfhd6c6zas2b", "content": "", "creation_timestamp": "2025-01-11T08:49:06.615809Z"}, {"uuid": "0d5f2b1d-200a-4760-9823-5cbe429d9773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11916", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7cirzf2d25", "content": "", "creation_timestamp": "2025-01-08T04:15:44.825403Z"}, {"uuid": "72e69d62-9b67-4f47-ab2f-e204c9d87925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11913", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113883622022632217", "content": "", "creation_timestamp": "2025-01-24T13:42:46.818066Z"}, {"uuid": "2726a53a-d094-4f95-a3c1-a78d90f010d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11917", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnncropfhk2a", "content": "", "creation_timestamp": "2025-04-25T13:19:35.020826Z"}, {"uuid": "57e1bf39-cdf6-49f2-931d-950557126c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11917", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114398915459976657", "content": "", "creation_timestamp": "2025-04-25T13:48:44.073447Z"}, {"uuid": "95142127-7a37-4bae-b63a-b76bd5f2c86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11919", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5kvcrtcln2n", "content": "", "creation_timestamp": "2025-11-14T04:56:20.339994Z"}, {"uuid": "bd8e53c2-3173-4764-ba53-4d31d478f91f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11917", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11917\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4.\n\ud83d\udccf Published: 2025-04-25T11:12:52.609Z\n\ud83d\udccf Modified: 2025-04-25T11:12:52.609Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/6de8a608-8715-4f9c-9f2f-df60dd1cc579?source=cve\n2. https://codecanyon.net/item/jobsearch-wp-job-board-wordpress-plugin/21066856", "creation_timestamp": "2025-04-25T12:09:53.000000Z"}, {"uuid": "6a879f29-c5e3-428f-8784-6c4befe36bad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11915", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11915\n\ud83d\udd39 Description: The RRAddons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.0 via the Popup block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to.\n\ud83d\udccf Published: 2025-01-11T07:21:51.144Z\n\ud83d\udccf Modified: 2025-01-11T07:21:51.144Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/3f7e300f-06b5-4f59-9deb-9771bf86a204?source=cve\n2. https://wordpress.org/plugins/rrdevs-for-elementor/", "creation_timestamp": "2025-01-11T08:04:18.000000Z"}, {"uuid": "11dd2c6c-8d25-4f35-b46d-c09f028d8645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11913", "type": "seen", "source": "https://t.me/cvedetector/16277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11913 - \"Blind Server-Side Request Forgery in Activity Plus Reloaded for BuddyPress Plugin\"\", \n  \"Content\": \"CVE ID : CVE-2024-11913 \nPublished : Jan. 24, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : The Activity Plus Reloaded for BuddyPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.1.1 via the 'ajax_preview_link' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T16:04:35.000000Z"}, {"uuid": "847aa998-b356-49de-8cb7-9a2391b9b51a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11916", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/622", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11916\n\ud83d\udd39 Description: The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to import and activate arbitrary code snippets along with\n\ud83d\udccf Published: 2025-01-08T03:18:10.667Z\n\ud83d\udccf Modified: 2025-01-08T03:18:10.667Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/747d7649-bdf5-46d0-a496-59cb7eac77ac?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3213331%40wpextended&amp;new=3213331%40wpextended&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-08T03:39:19.000000Z"}, {"uuid": "b34e7f8c-f294-4883-ade5-466bb2022ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11917", "type": "seen", "source": "https://t.me/cvedetector/23751", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11917 - Xing and Google Vulnerability: Authentication Bypass in JobSearch WP Job Board Plugin\", \n  \"Content\": \"CVE ID : CVE-2024-11917 \nPublished : April 25, 2025, 12:15 p.m. | 35\u00a0minutes ago \nDescription : The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T15:00:29.000000Z"}, {"uuid": "550c145f-2133-44b2-bbc2-53a0c99121fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11913", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2901", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11913\n\ud83d\udd39 Description: The Activity Plus Reloaded for BuddyPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.1.1 via the 'ajax_preview_link' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n\ud83d\udccf Published: 2025-01-24T13:40:57.391Z\n\ud83d\udccf Modified: 2025-01-24T13:40:57.391Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/69485409-8e91-4651-b9b8-69beb2364fa8?source=cve\n2. https://plugins.trac.wordpress.org/browser/bp-activity-plus-reloaded/tags/1.1.2/src/handlers/class-bpapr-preview-handler.php", "creation_timestamp": "2025-01-24T14:04:35.000000Z"}, {"uuid": "c2bc8a14-ee3a-4741-b98f-5ab78b410fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11916", "type": "seen", "source": "https://t.me/cvedetector/14648", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11916 - \"WordPress Toolkit WP Extended Code Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-11916 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to import and activate arbitrary code snippets along with \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:56.000000Z"}, {"uuid": "5ab396fa-757e-4053-a0e1-229183597c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11911", "type": "seen", "source": "https://t.me/cvedetector/12844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11911 - \"WordPress Crowdfunding WooCommerce Installation Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-11911 \nPublished : Dec. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_woocommerce_plugin() function action in all versions up to, and including, 2.1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install WooCommerce. This has a limited impact on most sites because WooCommerce is a requirement. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T10:45:08.000000Z"}, {"uuid": "5f8fd336-2442-4c3d-9dbe-cbcda81296ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11915", "type": "seen", "source": "https://t.me/cvedetector/15052", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11915 - Elementor RRAddons WordPress Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11915 \nPublished : Jan. 11, 2025, 8:15 a.m. | 33\u00a0minutes ago \nDescription : The RRAddons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.0 via the Popup block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T09:54:21.000000Z"}, {"uuid": "34ca6801-e9fb-43b8-a71f-d1448fe36e45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11910", "type": "seen", "source": "https://t.me/cvedetector/12848", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11910 - WordPress Crowdfunding Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11910 \nPublished : Dec. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : The WP Crowdfunding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp-crowdfunding/search block in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T10:45:11.000000Z"}, {"uuid": "5bea741c-6b83-48d1-86e0-d053b5e6f4ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11914", "type": "seen", "source": "https://t.me/cvedetector/12697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11914 - WordPress Attire Blocks Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-11914 \nPublished : Dec. 12, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The Gutenberg Blocks and Page Layouts \u2013 Attire Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'attire-blocks/post-carousel' block in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T06:17:35.000000Z"}, {"uuid": "309348a2-7e6e-44ad-86cd-63b9daaad7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11912", "type": "seen", "source": "https://t.me/cvedetector/13200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11912 - WordPress Travel Booking SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-11912 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : The Travel Booking WordPress Theme theme for WordPress is vulnerable to blind time-based SQL Injection via the \u2018order_id\u2019 parameter in all versions up to, and including, 3.1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:57.000000Z"}, {"uuid": "8cbc14ff-6a3e-4f51-a12d-b4eb68478d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11910", "type": "seen", "source": "Telegram/ruL-o_Gvh-ktdq7l9a5dkdX3Zy4egR1unONvdrhG-WyIecO9", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}, {"uuid": "f68285c2-6efd-4bdf-9fb6-0f474143835a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11911", "type": "seen", "source": "Telegram/CN5Xu5h4KHUHvJHM3euljiLlOyxhXOsbcB2F1iG_eD-uFLiy", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}, {"uuid": "784f0e4b-c4d5-41f0-beac-ee835636fc36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11913", "type": "seen", "source": "Telegram/tlhUNMs_h7MucmPeXgpnqvDatu1L-8kX3aBXf_SXLvZLI5Q7", "content": "", "creation_timestamp": "2025-02-06T02:42:29.000000Z"}, {"uuid": "01df40ff-f82d-4ade-9331-1f910e7175d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1191", "type": "seen", "source": "https://t.me/ctinow/192681", "content": "https://ift.tt/95SFLkP\nCVE-2024-1191 | Hyper CdCatalog 2.3.1 HCF File denial of service", "creation_timestamp": "2024-02-24T18:51:14.000000Z"}]}