{"vulnerability": "CVE-2024-1212", "sightings": [{"uuid": "b2294ed8-e946-4224-aca3-b3cf074baacb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113511789492366615", "content": "", "creation_timestamp": "2024-11-19T21:40:54.577305Z"}, {"uuid": "c54936c5-a09d-4ed0-8ff8-cb9893aa5b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2704492", "content": "", "creation_timestamp": "2024-11-18T22:19:12.809923Z"}, {"uuid": "a56bb10a-6d0c-440c-9776-549de5c524da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html", "content": "", "creation_timestamp": "2024-11-19T06:31:00.000000Z"}, {"uuid": "3ced8282-755b-435a-8641-f5ad96b0332e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-11-18T21:10:03.000000Z"}, {"uuid": "04fdb326-9d0f-47d2-bd83-c68ce41c0681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12123", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113592437254564347", "content": "", "creation_timestamp": "2024-12-04T03:30:39.619345Z"}, {"uuid": "011aa670-877e-49f1-83fe-1b24e63a0049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12128", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113610834260122412", "content": "", "creation_timestamp": "2024-12-07T09:29:15.778802Z"}, {"uuid": "c905d83a-8bd2-4a94-808b-e15869c30df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12121", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113677125841932115", "content": "", "creation_timestamp": "2024-12-19T02:28:05.061224Z"}, {"uuid": "454a9e0f-94c1-4087-b57e-b1f923beb1ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12127", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667467493547882", "content": "", "creation_timestamp": "2024-12-17T09:31:50.350066Z"}, {"uuid": "f730f1d8-652c-4e5f-949c-e6b6780940f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12127", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667480598232833", "content": "", "creation_timestamp": "2024-12-17T09:35:10.218174Z"}, {"uuid": "8e2196b7-95a4-44c5-b306-83b09d099ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12127", "type": "seen", "source": "https://social.circl.lu/users/vulnerability_lookup/statuses/113667616531322654", "content": "", "creation_timestamp": "2024-12-17T10:10:02.337689Z"}, {"uuid": "bd1530a3-9cc8-4431-881a-0cf4342881b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12122", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckgnpl6j25", "content": "", "creation_timestamp": "2025-01-09T11:15:41.978131Z"}, {"uuid": "9fb011ba-10a0-4f9f-95d8-2df47649bfb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12124", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4vfxyhmo2i", "content": "", "creation_timestamp": "2025-01-07T05:16:12.722683Z"}, {"uuid": "64a8a0bc-44f9-44d2-8a29-b2a31e147149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12126", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4vg2r2hk2k", "content": "", "creation_timestamp": "2025-01-07T05:16:15.075231Z"}, {"uuid": "2a764bc5-4dfa-4b62-a6fa-3843c52dc13c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12122", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798164190581247", "content": "", "creation_timestamp": "2025-01-09T11:29:43.675242Z"}, {"uuid": "352a1adf-c0c4-4afb-8309-c164aca0a833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-29)", "content": "", "creation_timestamp": "2025-03-29T00:00:00.000000Z"}, {"uuid": "d1510fe0-078e-4941-a2fa-e8eb69786f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12129", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917671374380676", "content": "", "creation_timestamp": "2025-01-30T14:01:58.379293Z"}, {"uuid": "da4d7ebb-8969-48e3-b15a-82aba4b08b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12129", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113918327149367781", "content": "", "creation_timestamp": "2025-01-30T16:50:57.525684Z"}, {"uuid": "61b0802a-188d-49ee-81f7-775016928384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "5896590e-5bee-48fd-9cb3-ef3d7951eb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "bad1fab8-0ac1-4f15-bb5d-65f965976602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "8a6edb0f-1f00-4bf3-b591-7b2d51930428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:59.000000Z"}, {"uuid": "b3608bc1-ecf2-4b3b-8037-7572b018e8d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12129", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxodbpgli2t", "content": "", "creation_timestamp": "2025-01-30T14:16:29.856089Z"}, {"uuid": "c2d09129-d6b6-4c6d-a9c4-bec14cd9893d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "9253dd0f-e4b4-4c21-addb-c5feeb00a03e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "b1cca3eb-b2ba-4b87-b2f6-82c3e129ce8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "ca1f2937-1565-403a-9717-3d0d6afbd144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-26)", "content": "", "creation_timestamp": "2025-03-26T00:00:00.000000Z"}, {"uuid": "570f1d18-287a-4d44-b660-8410d2455edc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}, {"uuid": "12ec908a-6a76-42ef-a429-773c0f0e467c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "c9be62d6-2f32-4082-afb3-ab62b7ee228c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "2c9ecfc6-4b37-419c-ab07-b8b2131b0f46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "f02e3076-88ef-4a9c-8277-4847d961b4d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "a18eea35-5c39-490d-b28e-2c934e88a749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "3edf9439-78c7-46a5-a626-ab18c541dd9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "43154744-be10-4cd5-acd7-27d65d8339c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:01.000000Z"}, {"uuid": "5aaeb5ab-458f-4c70-9366-b1389790ce9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-23)", "content": "", "creation_timestamp": "2025-03-23T00:00:00.000000Z"}, {"uuid": "ff169a0c-d2bc-44aa-9d94-bb08b747a595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-22)", "content": "", "creation_timestamp": "2025-03-22T00:00:00.000000Z"}, {"uuid": "f22f5543-ecb7-4dc4-9cf3-c50247bdf6a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "610ff991-e379-48e4-950b-55e6cc7c3db0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-28)", "content": "", "creation_timestamp": "2025-03-28T00:00:00.000000Z"}, {"uuid": "6d57158f-68db-4ac9-a12d-17e4283ab763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "7011ddd3-6c1c-4b38-92a6-ef096fa33a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "426c4025-b200-4de0-ab0d-60b93f18ebdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}, {"uuid": "1279eacf-2e95-48b7-811a-327db0ee2e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-02)", "content": "", "creation_timestamp": "2025-04-02T00:00:00.000000Z"}, {"uuid": "3d501f4c-9ff4-4f4f-a592-6bfdf3e28842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-03)", "content": "", "creation_timestamp": "2025-04-03T00:00:00.000000Z"}, {"uuid": "fc6b1e9f-c52a-4077-b32e-297483f25c2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-18)", "content": "", "creation_timestamp": "2025-05-18T00:00:00.000000Z"}, {"uuid": "a465c88c-f5f1-4bcf-a8bd-b9ff0dae0396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-05)", "content": "", "creation_timestamp": "2025-04-05T00:00:00.000000Z"}, {"uuid": "7e92fd34-20f0-42cc-b957-cf3305318a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "27d4632e-aa2f-43e1-88a7-b925048f780f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-08)", "content": "", "creation_timestamp": "2025-04-08T00:00:00.000000Z"}, {"uuid": "7e7981e2-3917-4b62-a274-61992b72c250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "bc02c19c-0058-49ec-925a-6956be8920ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "a5ee7f2e-6997-4f97-8803-d1d6bf49ecee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "3cb73653-59be-41b1-9a06-6a0d6a9506da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-11)", "content": "", "creation_timestamp": "2025-04-11T00:00:00.000000Z"}, {"uuid": "ef7d1051-4252-47bf-9b37-1c32b64a2495", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-13)", "content": "", "creation_timestamp": "2025-04-13T00:00:00.000000Z"}, {"uuid": "6b50e88f-dcee-4497-8ce9-120046f3a316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "97464fda-81b7-4ab2-a43b-5802a86e5c85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-17)", "content": "", "creation_timestamp": "2025-04-17T00:00:00.000000Z"}, {"uuid": "25eba47b-9d49-4385-87f5-eabec583da60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "b402a133-5fb8-4f44-ba6f-5d8cd156185c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-15)", "content": "", "creation_timestamp": "2025-04-15T00:00:00.000000Z"}, {"uuid": "d4b5e8ea-41f9-4211-a4f9-9bbf8bff39cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "6ee08e04-1f05-4780-8702-770d3e122d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-18)", "content": "", "creation_timestamp": "2025-04-18T00:00:00.000000Z"}, {"uuid": "0d494cea-16b3-48fb-8ca5-a78ce04d5c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "b61c2736-d169-4917-a9a0-0147692b8e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "94780fa0-375d-4bbc-a3eb-91cbb2ee5d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "e05a5aee-ca23-46ef-8f4d-f36cbe04793d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-21)", "content": "", "creation_timestamp": "2025-04-21T00:00:00.000000Z"}, {"uuid": "24995f33-21ac-4092-bcdb-d144c90506ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "892f329a-be1a-462c-892e-477288cbe745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-22)", "content": "", "creation_timestamp": "2025-04-22T00:00:00.000000Z"}, {"uuid": "96cc2502-1164-4407-bd0c-fa226ad09486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "254ef599-b957-4ace-8c4d-ed33757fab16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "fb319c2c-eade-4b78-ad6d-7a09eabaf1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "0d2bd964-1750-4231-aee5-b8f5779fb12b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "7b855645-24bf-4125-af01-95baf2d09959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-30)", "content": "", "creation_timestamp": "2025-04-30T00:00:00.000000Z"}, {"uuid": "b0c1119d-ef74-4bed-b7bd-66fafe41ceba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-03)", "content": "", "creation_timestamp": "2025-05-03T00:00:00.000000Z"}, {"uuid": "d69aef5d-8882-447a-819b-97054aac91b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-02)", "content": "", "creation_timestamp": "2025-05-02T00:00:00.000000Z"}, {"uuid": "32aac317-79e9-4e31-881a-d208759f760c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "b560ee55-89ef-4c17-8b0e-114cf26ce03f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "f8b5546e-8ad3-4781-a61e-5aa700c52d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12120", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lokwih4arzl2", "content": "", "creation_timestamp": "2025-05-07T08:03:25.038236Z"}, {"uuid": "b49a678d-28eb-494a-b516-55e056ea30c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "75c8f326-4456-4495-af91-9a52894e7763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "d641d628-76fa-4560-8644-8df00b099dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "205c92f7-55c6-4afa-b45a-0297b6fe73bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "fe16d055-4cbd-4be3-95a6-16d803762699", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv2kljlopo2g", "content": "", "creation_timestamp": "2025-07-28T21:40:13.870195Z"}, {"uuid": "138c6d0a-53e9-405e-96e1-aa9c91fb2c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/progress_kemp_loadmaster_sudo_privesc_2024.rb", "content": "", "creation_timestamp": "2024-05-10T14:47:57.000000Z"}, {"uuid": "0f7597dd-1211-4e7b-9ab7-9f5e1833de9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://gist.github.com/Darkcrai86/a029fbc8652f34f91701b1d58243e483", "content": "", "creation_timestamp": "2025-08-28T17:01:38.000000Z"}, {"uuid": "1c3e2251-c8dd-413a-8943-89a7c1f93530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/progress_kemp_loadmaster_unauth_cmd_injection.rb", "content": "", "creation_timestamp": "2024-04-26T23:37:25.000000Z"}, {"uuid": "3ab9aa72-26c3-4033-be36-48d2aceaf4cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-04)", "content": "", "creation_timestamp": "2026-03-04T00:00:00.000000Z"}, {"uuid": "bfbc74db-71ee-4c8a-bba2-6e9a1fd80c6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "fd484e87-6886-4250-95be-c9a8126315d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-16)", "content": "", "creation_timestamp": "2026-02-16T00:00:00.000000Z"}, {"uuid": "0154c898-6ed1-49a3-9e05-1a268dcee7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "ebb5e6f2-8034-470a-a217-9818e3a0997d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "8abe5605-98d1-412c-8ab0-554c131f2b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-05)", "content": "", "creation_timestamp": "2026-03-05T00:00:00.000000Z"}, {"uuid": "772a9e11-fdde-442f-ba13-7bd16a6a5721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-17)", "content": "", "creation_timestamp": "2026-03-17T00:00:00.000000Z"}, {"uuid": "bee42698-20dc-4630-b9ed-ba0f45dbcdc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "3179be79-4160-48e5-bcae-24eec8d3c732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-14)", "content": "", "creation_timestamp": "2026-01-14T00:00:00.000000Z"}, {"uuid": "b79b2831-4dc8-4f25-8dc5-82decccf9a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "78001c21-04f0-4c57-bd34-554ffd74e114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-20)", "content": "", "creation_timestamp": "2026-01-20T00:00:00.000000Z"}, {"uuid": "9eaa5024-2a9e-485e-b9d2-d9ba80d1986c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9603", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a\ud83d\udc0d SQL Injection (SQLi)  \ud83d\udea8 Cross-Site Scripting (XSS)  \ud83d\udd10 Remote Code Execution (RCE)  \ud83d\udd0d And more!\nURL\uff1ahttps://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-12-25T14:36:21.000000Z"}, {"uuid": "2f78b9fd-8e94-4d42-b60f-7ca60b224baa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-23)", "content": "", "creation_timestamp": "2026-01-23T00:00:00.000000Z"}, {"uuid": "2200118f-3aed-428d-9bd3-77369b553a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-24)", "content": "", "creation_timestamp": "2026-01-24T00:00:00.000000Z"}, {"uuid": "2383add2-7cbd-4435-8337-05a5abdf8085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-27)", "content": "", "creation_timestamp": "2026-01-27T00:00:00.000000Z"}, {"uuid": "c3041b3e-953a-4370-9b10-c49052cb3e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d08e2367-edbb-4c0b-bd7d-d3479a89ffad", "content": "", "creation_timestamp": "2026-02-02T12:26:21.855514Z"}, {"uuid": "589be74f-0aac-4de0-ad49-baa0b44b7b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12124", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/317", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12124\n\ud83d\udd39 Description: The Role Includer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018user_id\u2019 parameter in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-07T04:22:16.840Z\n\ud83d\udccf Modified: 2025-01-07T04:22:16.840Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/97b3399b-cda2-4ab1-8919-b1e4ba4a5dcf?source=cve\n2. https://wordpress.org/plugins/role-includer/#developers", "creation_timestamp": "2025-01-07T04:38:16.000000Z"}, {"uuid": "b0c58f32-62f5-4a8a-880a-8a43e93c43d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12120", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12120\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown widget display_message_text parameter in all versions up to, and including, 1.7.1017 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-07T07:21:40.882Z\n\ud83d\udccf Modified: 2025-05-07T07:21:40.882Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5ee7b4d8-c397-41f6-981f-9a010e4ab2f1?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3236381/royal-elementor-addons/tags/1.7.1008/modules/countdown/widgets/wpr-countdown.php?old=3220755&amp;old_path=royal-elementor-addons%2Ftags%2F1.7.1007%2Fmodules%2Fcountdown%2Fwidgets%2Fwpr-countdown.php\n3. https://plugins.trac.wordpress.org/changeset/3285549/royal-elementor-addons/tags/1.7.1018/assets/js/frontend.js?old=3277554&amp;old_path=royal-elementor-addons%2Ftags%2F1.7.1017%2Fassets%2Fjs%2Ffrontend.js", "creation_timestamp": "2025-05-07T08:21:50.000000Z"}, {"uuid": "684d75da-ad1d-4e2b-a6fc-65eaa2249416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12126", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/461", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12126\n\ud83d\udd39 Description: The SEO Keywords plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018google_error\u2019 parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-07T04:21:57.953Z\n\ud83d\udccf Modified: 2025-01-07T16:24:55.459Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/325c2350-174b-4117-bacd-ae28bf3b16bc?source=cve\n2. https://wordpress.org/plugins/seo-keywords/#developers", "creation_timestamp": "2025-01-07T16:40:07.000000Z"}, {"uuid": "b89d9275-0a6f-4320-82a4-1d51f339c0d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12127", "type": "seen", "source": "https://t.me/cvedetector/13080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12127 - The Learning Management System, eLearning, Course\", \n  \"Content\": \"CVE ID : CVE-2024-12127 \nPublished : Dec. 17, 2024, 10:15 a.m. | 23\u00a0minutes ago \nDescription : The Learning Management System, eLearning, Course Builder, WordPress LMS Plugin \u2013 Sikshya LMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 0.0.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T11:45:47.000000Z"}, {"uuid": "745da18b-c981-4c2e-af9d-c3e9b0b04d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12121", "type": "seen", "source": "https://t.me/cvedetector/13302", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12121 - Wordpress Broken Link Checker Finder SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-12121 \nPublished : Dec. 19, 2024, 2:15 a.m. | 40\u00a0minutes ago \nDescription : The Broken Link Checker | Finder plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.5.0 via the 'moblc_check_link' function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T03:55:51.000000Z"}, {"uuid": "097a26a0-d23e-45ef-a395-cd27dd9b6630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12128", "type": "seen", "source": "https://t.me/cvedetector/12319", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12128 - PayPal Simple Ecommerce Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-12128 \nPublished : Dec. 7, 2024, 10:15 a.m. | 20\u00a0minutes ago \nDescription : The Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018monthly_sales_current_year\u2019 parameter in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-07T11:41:59.000000Z"}, {"uuid": "8888b1eb-72c8-4fc3-9386-267c94c65932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12123", "type": "seen", "source": "https://t.me/cvedetector/11948", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12123 - A hidden field manipulation vulnerability was iden\", \n  \"Content\": \"CVE ID : CVE-2024-12123 \nPublished : Dec. 4, 2024, 4:15 a.m. | 29\u00a0minutes ago \nDescription : A hidden field manipulation vulnerability was identified in Issuetrak version 17.1 that could be triggered by an authenticated user.\u00a0  \n  \nWhen an authenticated user submits a ticket, the request can be intercepted and subsequently modified by using a proxy.\u00a0 The ticket requester can be changed from the original requester to another user in the same application,   \nwhich the application then accepts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T05:52:54.000000Z"}, {"uuid": "913f597b-97f2-4f5b-99c2-1a4b2c3cd420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/2928", "content": "\ud83d\udea8CVE-2024-1212: Command Injection Exploit for Kemp LoadMaster\n\nhttps://darkwebinformer.com/cve-2024-1212-command-injection-exploit-for-kemp-loadmaster/", "creation_timestamp": "2024-09-04T18:43:51.000000Z"}, {"uuid": "deb802e6-d468-4efc-bb1e-1177246cb2bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "Telegram/EEmwsx5Raa0aAxA0DuOiTZexUCgMq_8cgq3XWUhyw5Ij3Q", "content": "", "creation_timestamp": "2024-05-01T12:01:36.000000Z"}, {"uuid": "6c379168-5bb8-4c5e-ac38-3caa7b5d25e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://t.me/arpsyndicate/4900", "content": "#ExploitObserverAlert\n\nCVE-2024-1212\n\nDESCRIPTION: Exploit Observer has 42 entries in 11 file formats related to CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nFIRST-EPSS: 0.002130000\nARPS-PRIORITY: 0.9770812", "creation_timestamp": "2024-05-02T21:12:07.000000Z"}, {"uuid": "84105063-c24b-42ea-b9c6-3ef034d426cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "Telegram/aGiEOLt66R_GPYni9sAb8cj24a0FQtLLwMdvkifLZPazqw", "content": "", "creation_timestamp": "2024-05-01T12:15:24.000000Z"}, {"uuid": "054e3994-4b30-4ca5-8635-f47b2c34a4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/4359", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-24T01:12:42.000000Z"}, {"uuid": "289458d4-bd9e-489e-a821-5ecf4dd0cee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://t.me/arpsyndicate/4270", "content": "#ExploitObserverAlert\n\nPD/http/cves/2024/CVE-2024-1212\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.", "creation_timestamp": "2024-03-21T13:36:23.000000Z"}, {"uuid": "9d503cf9-c29d-48e3-b32b-01bb89bac381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "Telegram/nijFPmulGSJ7GXqbamJhv2Jo84bFZjhbs9WM1DO2JDAXaw", "content": "", "creation_timestamp": "2024-11-19T09:10:12.000000Z"}, {"uuid": "f241326e-8667-4c46-97a7-137ab60db6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://t.me/arpsyndicate/4053", "content": "#ExploitObserverAlert\n\nCVE-2024-1212\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.", "creation_timestamp": "2024-02-22T21:17:34.000000Z"}, {"uuid": "d559420f-602f-4a9f-89de-379139e6cf37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/149", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-06-17T13:58:11.000000Z"}, {"uuid": "02779310-5b87-45ed-9a9f-f93815d01916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/791", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-24T01:12:42.000000Z"}, {"uuid": "4b62c232-8f3d-4c8b-b411-310697114287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "https://t.me/KomunitiSiber/2884", "content": "Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation\nhttps://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html\n\nNow-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged.\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was", "creation_timestamp": "2024-11-19T12:32:55.000000Z"}, {"uuid": "b2aa0fbe-cb1a-4f62-bfb7-5a38a0a11d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatCommunity/7670", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-23T23:50:30.000000Z"}, {"uuid": "acd1abc3-11e0-4734-87bd-59890a61bd3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://t.me/ctinow/206537", "content": "https://ift.tt/ijlXO4C\nCVE-2024-1212 | Progress LoadMaster up to 7.1.35.10/7.2.48.9/7.2.54.7/7.2.59.1 os command injection", "creation_timestamp": "2024-03-13T10:41:09.000000Z"}, {"uuid": "46d0dbe2-0d80-48fe-a41c-d77d2092281b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/20641", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-23T23:50:48.000000Z"}, {"uuid": "da9f3606-05ff-422b-8186-f7c5608ec04c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3239", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-27T20:09:16.000000Z"}, {"uuid": "081c4da9-3484-4c7f-ae48-06fa1c16647d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "exploited", "source": "https://t.me/thehackernews/5908", "content": "Major security flaws in Progress Kemp LoadMaster (CVE-2024-1212) and VMware vCenter Server (CVE-2024-38812 and CVE-2024-38813) are actively being exploited. \n \nLearn how to mitigate this flaw and secure your system before it\u2019s too late \u2013 Read more: https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html", "creation_timestamp": "2024-11-19T07:37:25.000000Z"}, {"uuid": "2fd26614-5cbd-410e-8437-3d03877e6be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "seen", "source": "https://t.me/ctinow/189963", "content": "https://ift.tt/RrV68YL\nCVE-2024-1212", "creation_timestamp": "2024-02-21T19:21:50.000000Z"}, {"uuid": "03d66a27-4dbd-4a5d-b464-d30709e41dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2408", "content": "cve-2024-1212\n\nGET /access/set?param=enableapi&amp;value=1 HTTP/1.1\nHost: your-ip\nAuthorization: Basic JztsczsnOmRvZXNub3RtYXR0ZXI=\n\n#poc #exploit", "creation_timestamp": "2024-05-01T12:15:39.000000Z"}, {"uuid": "af14ac2d-481b-4a5b-94ef-96232a36ad40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/24801", "content": "Tools - Hackers Factory\n\nResources for Mobile Application Testing\n\nhttps://github.com/0xSojalSec/Mobile-Application-Security\n\nCVE-2024-1212: Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.\n\nhttps://github.com/Chocapikk/CVE-2024-1212\n\nbug_bounty_scripts\n/firebase-scanner.py\n\nhttps://github.com/geeknik/bug_bounty_scripts/blob/main/firebase-scanner.py\n\nIndirect syscalls + DInvoke made simple.\n\nhttps://github.com/nbaertsch/nimvoke\n\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\n\nhttps://github.com/Nassim-Asrir/CVE-2023-36424\n\nOSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.\n\nhttps://github.com/Astrosp/Awesome-OSINT-For-Everything\n\nRembg is a tool to remove images background\n\nhttps://github.com/danielgatis/rembg\n\nHiddenVM \u2014 Use any desktop OS without leaving a trace.\n\nhttps://github.com/aforensics/HiddenVM\n\nGooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\nRustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.\n\nhttps://github.com/joaoviictorti/RustRedOps\n\n#HackersFactory", "creation_timestamp": "2024-03-25T00:00:20.000000Z"}, {"uuid": "66213cbf-61c6-4734-8a66-2dee0f675f4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10195", "content": "#exploit\n1. CVE-2023-48788:\nFortinet FortiClient EMS SQL Injection\nhttps://www.horizon3.ai/attack-research/attack-blogs/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive\n\n2. CVE-2023-48725:\nNetgear RAX30 stack-based buffer overflow vulnerability\nhttps://blog.talosintelligence.com/vulnerability-roundup-march-20-2024\n\n3. CVE-2024-1212:\nUnauthenticated Command Injection In Progress Kemp LoadMaster\nhttps://github.com/Chocapikk/CVE-2024-1212", "creation_timestamp": "2024-03-23T07:24:50.000000Z"}, {"uuid": "bd9bc22c-60a8-4e82-b5da-e320b4546aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "Telegram/AJ84SgKeS-o4x6xosnjyJhAm9Gu9lJ5QcZP7asEyWuwTjdnz", "content": "", "creation_timestamp": "2024-05-02T12:45:44.000000Z"}, {"uuid": "d25fc81e-253d-438a-8969-099840dbd400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1212", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/259", "content": "https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212/blob/main/Cyber_Project_Report.md\n\nExploiting RCE Vulnerability in Kemp LoadMaster (CVE-2024-1212)\n#github #poc #exploit", "creation_timestamp": "2024-12-26T15:21:24.000000Z"}]}