{"vulnerability": "CVE-2024-1200", "sightings": [{"uuid": "5240f6bc-86ba-4c35-9568-a4d323cd0382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12002", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113572036687180424", "content": "", "creation_timestamp": "2024-11-30T13:02:31.804102Z"}, {"uuid": "774c4789-75e0-4617-8740-280c7bb255ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113580057816825083", "content": "", "creation_timestamp": "2024-12-01T23:02:24.356973Z"}, {"uuid": "e128ddc9-9340-47e3-9647-b8a0340ca52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12003", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113605199823333797", "content": "", "creation_timestamp": "2024-12-06T09:36:21.555534Z"}, {"uuid": "b561624d-dc8d-486b-94a5-321411085e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113571978341810883", "content": "", "creation_timestamp": "2024-11-30T12:47:41.535916Z"}, {"uuid": "30926502-ef97-42d8-924d-50f1c1f96416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12000", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113571794336079178", "content": "", "creation_timestamp": "2024-11-30T12:00:53.711761Z"}, {"uuid": "549820fe-9e18-4c6d-bb01-fd7b89228a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12004", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113633372873751070", "content": "", "creation_timestamp": "2024-12-11T09:01:07.601456Z"}, {"uuid": "21a4a76f-cf08-4c0d-89a3-c6cb7dd99309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113825455589276906", "content": "", "creation_timestamp": "2025-01-14T07:10:21.020586Z"}, {"uuid": "7ab473cc-73a3-4c76-aec6-277ff08478e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113825455573584450", "content": "", "creation_timestamp": "2025-01-14T07:10:21.103609Z"}, {"uuid": "a37365e0-577e-41d9-a54f-116f2bc43ac2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfopeacj3z2t", "content": "", "creation_timestamp": "2025-01-14T07:15:47.009531Z"}, {"uuid": "696eb169-b86c-4e37-8942-7af18b2c87e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfopecjw7g2f", "content": "", "creation_timestamp": "2025-01-14T07:15:48.999293Z"}, {"uuid": "6b38c7cb-3e10-41da-ae66-388c6f098296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfoqujv6d32k", "content": "", "creation_timestamp": "2025-01-14T07:42:47.122119Z"}, {"uuid": "2c82561d-0c4a-4eab-ab8e-f5d925052d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfoqukkcno2w", "content": "", "creation_timestamp": "2025-01-14T07:42:48.398623Z"}, {"uuid": "2ec84f40-3969-4762-ac4d-7fdc4f9d97bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113865629807346067", "content": "", "creation_timestamp": "2025-01-21T09:27:07.693885Z"}, {"uuid": "43168818-2c44-48cd-a918-6ddbb6ba1f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgaoklkoip2e", "content": "", "creation_timestamp": "2025-01-21T10:49:21.521963Z"}, {"uuid": "4a4991dc-cf58-46fc-8644-513a094e12b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgamnzcv6g2j", "content": "", "creation_timestamp": "2025-01-21T10:15:28.980285Z"}, {"uuid": "7c812632-0caa-4e85-b328-668c9698e42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://t.me/cvedetector/15912", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12005 - \"WordPress WP-BibTeX CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-12005 \nPublished : Jan. 21, 2025, 10:15 a.m. | 38\u00a0minutes ago \nDescription : The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T11:56:27.000000Z"}, {"uuid": "e0673db1-d496-40fa-9243-6a091a1aef40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12009", "type": "seen", "source": "https://t.me/cvedetector/20028", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12009 - Zyxel EX5601-T1 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12009 \nPublished : March 11, 2025, 2:15 a.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : A post-authentication command injection vulnerability in the \"ZyEE\" function of the Zyxel EX5601-T1 firmware version V5.70(ACDZ.3.6)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T05:05:02.000000Z"}, {"uuid": "e5ecd5cc-bc13-4fd5-a3df-3bbd5fcf852e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12009", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk3ey3rdoh2h", "content": "", "creation_timestamp": "2025-03-11T05:55:25.546478Z"}, {"uuid": "a5296a20-7234-4d4a-8b1a-0a3c41e4fb36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxzvqyr2t", "content": "", "creation_timestamp": "2025-04-15T21:02:27.785007Z"}, {"uuid": "bdd9f2ea-82f0-4912-8a47-5f2befb0cdf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12006\n\ud83d\udd39 Description: The W3 Total Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 2.8.1. This makes it possible for unauthenticated attackers to deactivate the plugin as well as activate and deactivate plugin extensions.\n\ud83d\udccf Published: 2025-01-14T07:05:40.976Z\n\ud83d\udccf Modified: 2025-01-14T07:05:40.976Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/329ad5dc-9339-4540-aba3-f21a78a74d4b?source=cve\n2. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Extensions_Plugin_Admin.php#L186\n3. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Extensions_Plugin_Admin.php#L63\n4. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Extensions_Plugin_Admin.php#L220\n5. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Generic_Plugin_Admin.php#L212\n6. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Extensions_Plugin_Admin.php#L60", "creation_timestamp": "2025-01-14T08:08:11.000000Z"}, {"uuid": "b0515378-cb5a-47f5-b46f-227606188aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1461", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12008\n\ud83d\udd39 Description: The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks.\nNote: the debug feature must be enabled for this to be a concern, and it is disabled by default.\n\ud83d\udccf Published: 2025-01-14T07:05:41.364Z\n\ud83d\udccf Modified: 2025-01-14T07:05:41.364Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/8292f23c-fb17-4082-9788-f643d1bb097e?source=cve\n2. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Environment.php#L430\n3. https://plugins.trac.wordpress.org/browser/w3-total-cache/tags/2.8.0/Util_Debug.php#L29", "creation_timestamp": "2025-01-14T08:08:05.000000Z"}, {"uuid": "a8ad8d6c-e2ad-4aa4-ae7a-7e20d36559d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2383", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12005\n\ud83d\udd39 Description: The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-21T09:21:09.602Z\n\ud83d\udccf Modified: 2025-01-21T09:21:09.602Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/077538e2-ef9a-490f-9188-31f9cb82aaf7?source=cve\n2. https://wordpress.org/plugins/wp-bibtex/#developers\n3. https://plugins.trac.wordpress.org/browser/wp-bibtex/trunk/wp-bibtex-options.php#L55\n4. https://plugins.trac.wordpress.org/changeset/3225023", "creation_timestamp": "2025-01-21T10:01:18.000000Z"}, {"uuid": "3477b115-bc60-4607-a5c5-746dd21a126b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12003", "type": "seen", "source": "https://t.me/cvedetector/12184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12003 - The WP System plugin for WordPress is vulnerable t\", \n  \"Content\": \"CVE ID : CVE-2024-12003 \nPublished : Dec. 6, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : The WP System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the generate_wp_system_page_content() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T10:35:57.000000Z"}, {"uuid": "60468a35-5125-4af6-a731-883942e99dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12004", "type": "seen", "source": "https://t.me/cvedetector/12622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12004 - WooCommerce WPC Order Notes CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12004 \nPublished : Dec. 11, 2024, 9:15 a.m. | 40\u00a0minutes ago \nDescription : The WPC Order Notes for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.2. This is due to missing or incorrect nonce validation on the ajax_update_order_note() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T11:03:32.000000Z"}, {"uuid": "873d196a-9dce-4d15-b859-3e5c888300e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://t.me/cvedetector/15234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12006 - W3 Total Cache Unauthorized Data Modification\", \n  \"Content\": \"CVE ID : CVE-2024-12006 \nPublished : Jan. 14, 2025, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The W3 Total Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 2.8.1. This makes it possible for unauthenticated attackers to deactivate the plugin as well as activate and deactivate plugin extensions. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T08:58:26.000000Z"}, {"uuid": "ea913500-2554-4a4b-9e5c-c4c5f9adf118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://t.me/cvedetector/15233", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12008 - WordPress W3 Total Cache Debug Log Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12008 \nPublished : Jan. 14, 2025, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks.  \nNote: the debug feature must be enabled for this to be a concern, and it is disabled by default. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T08:58:25.000000Z"}, {"uuid": "39a6acd4-91eb-4852-9463-3d396ac8455c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12000", "type": "seen", "source": "https://t.me/cvedetector/11699", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12000 - A vulnerability was found in code-projects Blood B\", \n  \"Content\": \"CVE ID : CVE-2024-12000 \nPublished : Nov. 30, 2024, 12:15 p.m. | 8\u00a0hours, 57\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /controllers/updatesettings.php of the component Setting Handler. The manipulation of the argument firstname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-30T22:25:58.000000Z"}, {"uuid": "5fc49076-7793-41f0-9ba5-bbfe4089368d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12007", "type": "seen", "source": "https://t.me/cvedetector/11732", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12007 - \"Farmacia Code-Projects SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12007 \nPublished : Dec. 1, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in code-projects Farmacia 1.0. This affects an unknown part of the file /visualizar-produto.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T01:11:24.000000Z"}, {"uuid": "1a2bce10-8a5d-4e6e-8364-b234036fe1dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12002", "type": "seen", "source": "https://t.me/cvedetector/11698", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12002 - A vulnerability classified as problematic was foun\", \n  \"Content\": \"CVE ID : CVE-2024-12002 \nPublished : Nov. 30, 2024, 1:15 p.m. | 7\u00a0hours, 58\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Tenda FH451, FH1201, FH1202 and FH1206 up to 20241129. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-30T22:25:57.000000Z"}, {"uuid": "fc9d9869-59ae-4d0d-b2e0-6b854cbe23ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12001", "type": "seen", "source": "https://t.me/cvedetector/11697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12001 - A vulnerability classified as problematic has been\", \n  \"Content\": \"CVE ID : CVE-2024-12001 \nPublished : Nov. 30, 2024, 1:15 p.m. | 7\u00a0hours, 58\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is an unknown function of the file /controllers/updatesettings.php of the component Setting Handler. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-30T22:25:56.000000Z"}, {"uuid": "c0bb31e5-81fa-47dd-a7b7-e504e929d083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "Telegram/fSuv2KpyfIksaa8qqgqv5fCpt00UzRfooou1l9gqHjc-A0g", "content": "", "creation_timestamp": "2025-03-11T22:00:06.000000Z"}, {"uuid": "1162059c-91d8-4cd9-bd36-2e7847660c99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1200", "type": "seen", "source": "https://t.me/ctinow/192778", "content": "https://ift.tt/nZQqVY3\nCVE-2024-1200 | Jspxcms 10.2.0 /template/1/default/ information disclosure", "creation_timestamp": "2024-02-25T08:46:45.000000Z"}, {"uuid": "46b8476e-66e5-48ad-8730-060dd889808c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1200", "type": "seen", "source": "https://t.me/ctinow/183404", "content": "https://ift.tt/WBJCT6E\nCVE-2024-1200 Exploit", "creation_timestamp": "2024-02-12T21:16:40.000000Z"}, {"uuid": "d09b100b-623b-45c1-9710-47cd312d9402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1200", "type": "seen", "source": "https://t.me/ctinow/178385", "content": "https://ift.tt/fQeadqD\nCVE-2024-1200", "creation_timestamp": "2024-02-03T03:21:53.000000Z"}]}