{"vulnerability": "CVE-2024-1206", "sightings": [{"uuid": "f876beda-a361-4dfc-a113-c5cb4be82aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12062", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113588228650413765", "content": "", "creation_timestamp": "2024-12-03T09:40:21.528081Z"}, {"uuid": "9846043f-dae5-4874-b0f9-723ab48b6723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12060", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113605258854008312", "content": "", "creation_timestamp": "2024-12-06T09:51:21.834908Z"}, {"uuid": "e540b828-7c8a-4744-8a29-0375352b4195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12066", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113689636535412498", "content": "", "creation_timestamp": "2024-12-21T07:29:43.142624Z"}, {"uuid": "da032e6b-6bdd-415d-9c46-3515b2948ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12066", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldse5vdbkk25", "content": "", "creation_timestamp": "2024-12-21T07:15:38.170591Z"}, {"uuid": "e0ce83b0-47d4-40d8-9134-30dae1bf693c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12061", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113671721693474771", "content": "", "creation_timestamp": "2024-12-18T03:33:44.324415Z"}, {"uuid": "abe6ad6d-8aae-46d8-8b43-55a810bf170b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12067", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckgkl25527", "content": "", "creation_timestamp": "2025-01-09T11:15:38.678919Z"}, {"uuid": "04564d39-baa4-49d7-9176-cc07b3bdaee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12067", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798164176079263", "content": "", "creation_timestamp": "2025-01-09T11:29:43.488100Z"}, {"uuid": "7b6130eb-40f5-4bdc-a60f-43cb960421fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12066", "type": "seen", "source": "https://t.me/cvedetector/13489", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12066 - WordPress SMSA Shipping Plugin Remote File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12066 \nPublished : Dec. 21, 2024, 7:15 a.m. | 15\u00a0minutes ago \nDescription : The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-21T08:38:44.000000Z"}, {"uuid": "349cf761-a314-4f5b-9fe8-fb152be930e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12067", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/945", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12067\n\ud83d\udd39 Description: The WP Travel \u2013 Ultimate Travel Booking System, Tour Management Engine plugin for WordPress is vulnerable to SQL Injection via the 'booking_itinerary' parameter of the 'wptravel_get_booking_data' function in all versions up to, and including, 10.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-09T11:10:57.510Z\n\ud83d\udccf Modified: 2025-01-09T11:10:57.510Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/4e0f38db-84bb-4ba9-9068-40937e78010d?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-travel/trunk/inc/helpers/helpers-stat.php#L14\n3. https://plugins.trac.wordpress.org/browser/wp-travel/trunk/inc/helpers/helpers-stat.php#L64\n4. https://plugins.trac.wordpress.org/browser/wp-travel/trunk/app/inc/admin/class-wptravel-admin-assets.php#L17\n5. https://plugins.trac.wordpress.org/browser/wp-travel/trunk/app/inc/admin/class-wptravel-admin-assets.php#L31", "creation_timestamp": "2025-01-09T12:16:31.000000Z"}, {"uuid": "e1fd568c-70c7-4e9c-991b-f3b34caa5ce7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12069", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12069\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Lexicata plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link.\n\ud83d\udccf Published: 2025-02-19T07:32:09.799Z\n\ud83d\udccf Modified: 2025-02-19T07:32:09.799Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7541a595-aae4-49d2-862a-c1d1f4a1e6e5?source=cve\n2. https://wordpress.org/plugins/lexicata/", "creation_timestamp": "2025-02-19T08:41:12.000000Z"}, {"uuid": "3db0747b-ac1d-45c7-a16a-7f2d827ef59e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12063", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12063\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A Denial of Service (DoS) vulnerability exists in the file upload feature of imartinez/privategpt version v0.6.2. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable to legitimate users.\n\ud83d\udccf Published: 2025-03-20T10:11:34.263Z\n\ud83d\udccf Modified: 2025-03-20T10:11:34.263Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/7db0091f-cb53-4cde-aad7-7ce491dfd8d9", "creation_timestamp": "2025-03-20T10:19:32.000000Z"}, {"uuid": "c36574d9-5bc5-4f10-9a1d-28d33232a2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12069", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lijdidpgu32t", "content": "", "creation_timestamp": "2025-02-19T08:15:35.585183Z"}, {"uuid": "fa68dc7f-cebe-4edd-8234-d1ad4ac8185f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12060", "type": "seen", "source": "https://t.me/cvedetector/12176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12060 - The WP Media Optimizer (.webp) plugin for WordPres\", \n  \"Content\": \"CVE ID : CVE-2024-12060 \nPublished : Dec. 6, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : The WP Media Optimizer (.webp) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018wpmowebp-css-resources\u2019 and 'wpmowebp-js-resources' parameters in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T10:35:48.000000Z"}, {"uuid": "b4ce07ad-6c6c-4621-94fc-c962fb6215d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12061", "type": "seen", "source": "https://t.me/cvedetector/13154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12061 - Elementor WordPress Events Addon Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12061 \nPublished : Dec. 18, 2024, 4:15 a.m. | 43\u00a0minutes ago \nDescription : The Events Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.3 via the naevents_elementor_template shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T06:09:51.000000Z"}, {"uuid": "558cabbc-4fdf-4671-8822-811a6fa07d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12062", "type": "seen", "source": "https://t.me/cvedetector/11877", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12062 - Elementor Charity Addon WordPress Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12062 \nPublished : Dec. 3, 2024, 10:15 a.m. | 1\u00a0hour ago \nDescription : The Charity Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.2 via the 'nacharity_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T12:19:19.000000Z"}, {"uuid": "6f1fec57-3d49-4eb3-999d-d93a02ae36c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12069", "type": "seen", "source": "Telegram/Hr7yEc-eBBoFgekUiOL3AtziWii9GYycnOpt3SsEz7lrUbn6", "content": "", "creation_timestamp": "2025-02-19T15:39:51.000000Z"}, {"uuid": "f95b00b8-209f-4a8d-b34d-97ccef6c35ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1206", "type": "seen", "source": "https://t.me/ctinow/198325", "content": "https://ift.tt/3zypMvx\nCVE-2024-1206 | WP Recipe Maker Plugin up to 9.1.2 on WordPress sql injection (ID 3032702)", "creation_timestamp": "2024-03-02T11:41:53.000000Z"}]}