{"vulnerability": "CVE-2024-1209", "sightings": [{"uuid": "35749cb1-3405-4c8c-951c-f9c056cf8f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12099", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113592501505346516", "content": "", "creation_timestamp": "2024-12-04T03:47:00.716390Z"}, {"uuid": "b5936c4f-dfa0-4e1c-928d-d8f6ed1d13d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12094", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600229618241145", "content": "", "creation_timestamp": "2024-12-05T12:32:21.990127Z"}, {"uuid": "2fa02f4c-9b01-4c7f-a59a-da91ea29b299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12096", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706276341258936", "content": "", "creation_timestamp": "2024-12-24T06:01:26.242701Z"}, {"uuid": "ec654f1c-72b2-4b60-a73a-3b37e9c92a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12096", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzs7r2ere22", "content": "", "creation_timestamp": "2024-12-24T06:15:51.348984Z"}, {"uuid": "3b8b4a63-02b1-4cfc-b709-d86e3932ffd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12098", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785005186555443", "content": "", "creation_timestamp": "2025-01-07T03:43:13.238600Z"}, {"uuid": "08aae496-16f0-4b1e-b7a9-729810149caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12098", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4rzo6ul42a", "content": "", "creation_timestamp": "2025-01-07T04:15:37.768115Z"}, {"uuid": "5e4d67eb-467d-437a-8f43-71f0bfa78dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12097", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzuo6pz2f", "content": "", "creation_timestamp": "2025-03-06T12:00:33.605187Z"}, {"uuid": "cbe92299-da15-4de4-92cc-4a82a502fd78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12095", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulr7dhu42c", "content": "", "creation_timestamp": "2025-02-11T02:17:48.324748Z"}, {"uuid": "980d34c5-15ca-4df6-9c78-f9ac2ff941f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12097", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6542", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12097\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel allows SQL Injection.This issue affects E-Travel: before 15.12.2025.\n\ud83d\udccf Published: 2025-03-05T13:18:27.902Z\n\ud83d\udccf Modified: 2025-03-05T13:18:27.902Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0053", "creation_timestamp": "2025-03-05T13:35:03.000000Z"}, {"uuid": "3b8a5587-9ad1-4131-a780-a7644a5fcbf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12098", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/285", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12098\n\ud83d\udd39 Description: The ARS Affiliate Page Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'utm_keyword' parameter in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-07T03:21:57.939Z\n\ud83d\udccf Modified: 2025-01-07T03:21:57.939Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a25b2187-2ba8-4332-9f96-a003edd97ff6?source=cve\n2. https://wordpress.org/plugins/ars-affiliate-page/", "creation_timestamp": "2025-01-07T03:36:25.000000Z"}, {"uuid": "1d3061ec-ab08-441f-804c-6f4529c71281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12097", "type": "seen", "source": "Telegram/UHL0TJKIonORmRgyHs-hZ1z9VuX5d0aMuE4E8UqAWNdn_m6Z", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}, {"uuid": "ab7e3b0b-afe2-4c33-afa7-a67323de39c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12093", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17276", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12093\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: An issue has been discovered in GitLab CE/EE affecting all versions from 11.1 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Improper XPath validation allows modified SAML response to bypass 2FA requirement under specialized conditions.\n\ud83d\udccf Published: 2025-05-22T14:32:04.147Z\n\ud83d\udccf Modified: 2025-05-22T14:32:04.147Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/507445\n2. https://hackerone.com/reports/2851261", "creation_timestamp": "2025-05-22T14:43:11.000000Z"}, {"uuid": "c8359108-5fd9-4342-9a9e-8ccf921877ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12094", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11778", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12094\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L)\n\ud83d\udd39 Description: This vulnerability exists in the Tinxy mobile app due to storage of logged-in user information in plaintext on the device database. An attacker with physical access to the rooted device could exploit this vulnerability by accessing its database leading to unauthorized access of user information such as username, email address and mobile number.\nNote:\nTo exploit this vulnerability, the device must be rooted/jailbroken.\n\ud83d\udccf Published: 2024-12-05T12:27:41.540Z\n\ud83d\udccf Modified: 2025-04-15T09:16:24.183Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;VLCODE=CIVN-2024-0355", "creation_timestamp": "2025-04-15T09:55:18.000000Z"}, {"uuid": "35518188-019a-4927-b243-945ed0181c60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12097", "type": "seen", "source": "https://t.me/cvedetector/19635", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12097 - Boceksoft Informatics E-Travel SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12097 \nPublished : March 5, 2025, 2:15 p.m. | 53\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel allows SQL Injection.This issue affects E-Travel: before 15.12.2024. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T16:56:40.000000Z"}, {"uuid": "63583924-bbc0-4122-a151-45fe48cf209e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12096", "type": "seen", "source": "https://t.me/cvedetector/13567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12096 - WordPress Exhibit to WP Gallery XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12096 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : The Exhibit to WP Gallery WordPress plugin through 0.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:45.000000Z"}, {"uuid": "dba94802-d7f5-42a6-abf9-fa5a59d02a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12098", "type": "seen", "source": "https://t.me/cvedetector/14440", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12098 - WordPress ARS Affiliate Page Plugin Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12098 \nPublished : Jan. 7, 2025, 4:15 a.m. | 39\u00a0minutes ago \nDescription : The ARS Affiliate Page Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'utm_keyword' parameter in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T06:19:51.000000Z"}, {"uuid": "21970756-6667-4db0-b72e-77a209c66884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12099", "type": "seen", "source": "https://t.me/cvedetector/11947", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12099 - The Dollie Hub \u2013 Build Your Own WordPress Cloud Pl\", \n  \"Content\": \"CVE ID : CVE-2024-12099 \nPublished : Dec. 4, 2024, 4:15 a.m. | 29\u00a0minutes ago \nDescription : The Dollie Hub \u2013 Build Your Own WordPress Cloud Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.2.0 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T05:52:53.000000Z"}, {"uuid": "64870c89-667b-4918-9f50-bf012baa2303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1209", "type": "seen", "source": "https://t.me/ctinow/192895", "content": "https://ift.tt/Ze2HtUu\nCVE-2024-1209 | LearnDash LMS Plugin up to 4.10.1 on WordPress Assignment information disclosure", "creation_timestamp": "2024-02-25T14:46:18.000000Z"}, {"uuid": "59e2192d-2c66-42ec-8b15-766c7716b563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1209", "type": "seen", "source": "https://t.me/arpsyndicate/3862", "content": "#ExploitObserverAlert\n\nPD/http/cves/2024/CVE-2024-1209\n\nDESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1209. The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads.", "creation_timestamp": "2024-02-21T21:13:12.000000Z"}, {"uuid": "42440d76-12c6-4c1b-9298-5ca68b37ecaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1209", "type": "seen", "source": "https://t.me/ctinow/184928", "content": "https://ift.tt/oLbF14f\nCVE-2024-1209 Exploit", "creation_timestamp": "2024-02-14T19:16:21.000000Z"}]}