{"vulnerability": "CVE-2024-1207", "sightings": [{"uuid": "0f2c527a-b28b-44fd-b303-fd0046069d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12072", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113638371596006018", "content": "", "creation_timestamp": "2024-12-12T06:12:22.140128Z"}, {"uuid": "c7ad40e7-d618-463e-b781-8d5003e29e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12073", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf4zpnn76s2e", "content": "", "creation_timestamp": "2025-01-07T06:33:14.624833Z"}, {"uuid": "99df64b4-1058-45f6-be97-82d1a539e322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12077", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785878731395996", "content": "", "creation_timestamp": "2025-01-07T07:25:23.368323Z"}, {"uuid": "5d871e64-0d1a-444a-8639-a6faba37c1be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12077", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf57hbvbtx2i", "content": "", "creation_timestamp": "2025-01-07T08:15:53.332926Z"}, {"uuid": "155c2be3-517b-48f3-942a-f3d12e5c304c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12077", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5aycy3m42e", "content": "", "creation_timestamp": "2025-01-07T08:43:19.442634Z"}, {"uuid": "ae04074e-e9e2-4566-ae48-7ba417de14e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12073", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785499151507228", "content": "", "creation_timestamp": "2025-01-07T05:48:50.417316Z"}, {"uuid": "aece7961-3a4a-409b-ae56-79af73ab4f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12073", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4yqudtgs2f", "content": "", "creation_timestamp": "2025-01-07T06:15:58.572145Z"}, {"uuid": "9e1ec70b-98ff-4e22-8b4a-fe3f132a6c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12071", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113847225025868805", "content": "", "creation_timestamp": "2025-01-18T03:26:32.576939Z"}, {"uuid": "393fa052-27a1-45eb-88c3-40460cd2b4f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12071", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfyh5kvfnb2h", "content": "", "creation_timestamp": "2025-01-18T04:15:30.344899Z"}, {"uuid": "ec9b1337-26c5-49b5-8e63-75b38ca90dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12071", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfyizo5osh2r", "content": "", "creation_timestamp": "2025-01-18T04:49:06.869148Z"}, {"uuid": "1e6ab0b4-17b9-43d0-93d4-37a2ebffc936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12076", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113887813133186587", "content": "", "creation_timestamp": "2025-01-25T07:28:38.238364Z"}, {"uuid": "d8db2e04-7d63-4255-8472-88918ea05b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12079", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggggur5of2q", "content": "", "creation_timestamp": "2025-01-23T17:40:05.496711Z"}, {"uuid": "0a7905b9-151e-4ec4-9d90-04a114ebc3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12071", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2271", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12071\n\ud83d\udd39 Description: The Evergreen Content Poster \u2013 Auto Post and Schedule Your Best Content to Social Media plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_network_post() function in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to delete arbitrary posts and pages.\n\ud83d\udccf Published: 2025-01-18T03:21:12.989Z\n\ud83d\udccf Modified: 2025-01-18T03:21:12.989Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/aa07f48f-370f-4985-a6fc-a94ed5c59ed4?source=cve\n2. https://plugins.trac.wordpress.org/browser/evergreen-content-poster/trunk/includes/class-evergreen_content_poster.php#L345\n3. https://plugins.trac.wordpress.org/browser/evergreen-content-poster/trunk/admin/class-evergreen_content_poster-admin.php#L333\n4. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3224190%40evergreen-content-poster&amp;new=3224190%40evergreen-content-poster&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-18T03:57:31.000000Z"}, {"uuid": "78f6f161-f9ea-43bd-9681-38e807379079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12078", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lggggugueo2k", "content": "", "creation_timestamp": "2025-01-23T17:40:04.636543Z"}, {"uuid": "d304a6cd-5ef3-4ee9-b9e7-30c932f81924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12078", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggf3524lv27", "content": "", "creation_timestamp": "2025-01-23T17:15:37.232854Z"}, {"uuid": "0b818521-a24d-420e-9c3e-ff7f82c3d2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12079", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggf37ubxe2t", "content": "", "creation_timestamp": "2025-01-23T17:15:40.243306Z"}, {"uuid": "eafcb469-74c6-4f1b-9cfa-4bb0c53361f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12073", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/333", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12073\n\ud83d\udd39 Description: The Meteor Slides plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slide_url_value' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-01-07T05:23:57.939Z\n\ud83d\udccf Modified: 2025-01-07T05:23:57.939Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/be913494-f4a7-4718-ac2b-da4baf2b0a21?source=cve\n2. https://wordpress.org/plugins/meteor-slides/", "creation_timestamp": "2025-01-07T05:37:54.000000Z"}, {"uuid": "addbaf2a-21ca-477a-87c5-a6d81436b2bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12077", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/364", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12077\n\ud83d\udd39 Description: The Booking Calendar and Booking Calendar Pro plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the \u2018calendar_id\u2019 parameter in all versions up to, and including, 3.2.19 and 11.2.19 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-07T07:22:33.559Z\n\ud83d\udccf Modified: 2025-01-07T07:22:33.559Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/81cc09ee-da3d-407d-82c0-542b56df5aed?source=cve\n2. https://plugins.trac.wordpress.org/browser/booking-calendar/tags/3.2.16/admin/views/Reservations.php#L528\n3. https://plugins.trac.wordpress.org/browser/booking-calendar/tags/3.2.16/admin/views/Reservations.php#L532\n4. https://plugins.trac.wordpress.org/changeset/3209851/", "creation_timestamp": "2025-01-07T07:36:56.000000Z"}, {"uuid": "c098d5ad-97fa-4adc-b13e-db709f7c04fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12076", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3067", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12076\n\ud83d\udd39 Description: The Target Video Easy Publish plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.3. This is due to missing or incorrect nonce validation on the resync_carousel(), seek_snapshot(), uploaded_cc(), and remove_cc() functions. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-25T07:24:13.906Z\n\ud83d\udccf Modified: 2025-01-25T07:24:13.906Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/192b8ab0-f80e-4c0e-9cc0-df567d5791a8?source=cve\n2. https://plugins.trac.wordpress.org/browser/brid-video-easy-publish/trunk/lib/BridHtml.php#L465\n3. https://plugins.trac.wordpress.org/browser/brid-video-easy-publish/trunk/lib/BridHtml.php#L489\n4. https://plugins.trac.wordpress.org/browser/brid-video-easy-publish/trunk/lib/BridHtml.php#L1169\n5. https://plugins.trac.wordpress.org/browser/brid-video-easy-publish/trunk/lib/BridHtml.php#L1185\n6. https://wordpress.org/plugins/brid-video-easy-publish/#developers\n7. https://plugins.trac.wordpress.org/changeset/3226143/", "creation_timestamp": "2025-01-25T08:05:49.000000Z"}, {"uuid": "c77371a9-7438-47fd-ba3a-a59423016c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12077", "type": "seen", "source": "https://t.me/cvedetector/14503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12077 - Booking Calendar and Booking Calendar Pro Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12077 \nPublished : Jan. 7, 2025, 8:15 a.m. | 20\u00a0minutes ago \nDescription : The Booking Calendar and Booking Calendar Pro plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the \u2018calendar_id\u2019 parameter in all versions up to, and including, 3.2.19 and 11.2.19 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T09:41:26.000000Z"}, {"uuid": "5fe62363-83c7-42a9-a8ca-e92dd338af3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12076", "type": "seen", "source": "https://t.me/cvedetector/16378", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12076 - \"Target Video Easy Publish WordPress CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-12076 \nPublished : Jan. 25, 2025, 8:15 a.m. | 42\u00a0minutes ago \nDescription : The Target Video Easy Publish plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.3. This is due to missing or incorrect nonce validation on the resync_carousel(), seek_snapshot(), uploaded_cc(), and remove_cc() functions. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-25T10:28:58.000000Z"}, {"uuid": "ad809e61-e504-4a0f-a41a-a6d5cef86f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12071", "type": "seen", "source": "https://t.me/cvedetector/15778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12071 - WordPress Evergreen Content Poster - Unauthenticated Remote Data Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12071 \nPublished : Jan. 18, 2025, 4:15 a.m. | 40\u00a0minutes ago \nDescription : The Evergreen Content Poster \u2013 Auto Post and Schedule Your Best Content to Social Media plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_network_post() function in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to delete arbitrary posts and pages. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T06:11:55.000000Z"}, {"uuid": "04d06cd3-09f4-4dc6-8987-5aad24dd64ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12073", "type": "seen", "source": "https://t.me/cvedetector/14480", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12073 - WordPress Meteor Slides Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-12073 \nPublished : Jan. 7, 2025, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Meteor Slides plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slide_url_value' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T08:00:48.000000Z"}, {"uuid": "2a4d140b-0b46-4474-800d-131b0a71e86a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1207", "type": "seen", "source": "https://t.me/ctinow/198272", "content": "https://ift.tt/PmUMBAe\nCVE-2024-1207 | wpdevelop WP Booking Calendar Plugin up to 9.9 on WordPress calendar_request_params[dates_ddmmyy_csv]' sql injection", "creation_timestamp": "2024-03-02T08:36:58.000000Z"}, {"uuid": "5bdaf270-1d40-43d2-9dc6-285269436429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12078", "type": "seen", "source": "https://t.me/cvedetector/16212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12078 - ECOVACS BLE GATT Auth Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12078 \nPublished : Jan. 23, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : ECOVACS robot lawn mowers and vacuums use a shared, static secret key to encrypt BLE GATT messages. An unauthenticated attacker within BLE range can control any robot using the same key. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:09:14.000000Z"}, {"uuid": "9279676a-a34f-49b4-962e-d314b8af8f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12079", "type": "seen", "source": "https://t.me/cvedetector/16213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12079 - ECOVACS Robot Lawnmowers Text-Based Authentication Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12079 \nPublished : Jan. 23, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : ECOVACS robot lawnmowers store the anti-theft PIN in cleartext on the device filesystem. An attacker can steal a lawnmower, read the PIN, and reset the anti-theft mechanism. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T19:09:15.000000Z"}, {"uuid": "68fa9736-5a97-4db0-bd58-584e662cb83e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12072", "type": "seen", "source": "https://t.me/cvedetector/12730", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12072 - Google Analytics Made Easy XSS Reflection in Analytics Cat for WordPress\", \n  \"Content\": \"CVE ID : CVE-2024-12072 \nPublished : Dec. 12, 2024, 6:15 a.m. | 42\u00a0minutes ago \nDescription : The Analytics Cat \u2013 Google Analytics Made Easy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T07:58:30.000000Z"}, {"uuid": "4e913a19-be5d-4729-97f5-4ee9d610dbb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1207", "type": "seen", "source": "https://t.me/ctinow/181264", "content": "https://ift.tt/mir7ajL\nCVE-2024-1207", "creation_timestamp": "2024-02-08T10:21:30.000000Z"}]}