{"vulnerability": "CVE-2024-1213", "sightings": [{"uuid": "16defb86-5b68-4c8a-abc6-705186d711cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12138", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113594928209572244", "content": "", "creation_timestamp": "2024-12-04T14:04:08.513953Z"}, {"uuid": "cb12402c-de65-4dc6-bdcd-486a3e31ee52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12130", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601483770927719", "content": "", "creation_timestamp": "2024-12-05T17:51:18.540639Z"}, {"uuid": "a9cf91b5-7eb4-4e86-823d-94557c836f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12130", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "597b4b40-33b4-48f5-9983-9565a67cc55d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12130", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1651/", "content": "", "creation_timestamp": "2024-12-10T05:00:00.000000Z"}, {"uuid": "986c4d0a-505a-480e-8196-8e452bd500cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12131", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5sd4usyu2q", "content": "", "creation_timestamp": "2025-01-07T13:53:34.906968Z"}, {"uuid": "8e56ecc1-b67d-4f6b-8e2f-b64c34ad79ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12131", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5q7rhuy625", "content": "", "creation_timestamp": "2025-01-07T13:15:54.805444Z"}, {"uuid": "e5019c7b-7124-4399-85c1-9005d55a0d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12132", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113763456158197001", "content": "", "creation_timestamp": "2025-01-03T08:23:01.224724Z"}, {"uuid": "d7f50e9a-d550-40b6-9428-33391a3069c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12132", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3letavqjsnn2k", "content": "", "creation_timestamp": "2025-01-03T09:15:14.959315Z"}, {"uuid": "c73b19c7-649a-4ccf-a81a-e390e9a12b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12132", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3letdae5wd22q", "content": "", "creation_timestamp": "2025-01-03T09:56:59.707074Z"}, {"uuid": "093e37b2-71a8-49b4-9cbe-8886e91adade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980300155433076", "content": "", "creation_timestamp": "2025-02-10T15:29:19.952517Z"}, {"uuid": "23669c69-bbc0-40b4-bcbd-6eef234a0c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhjpkkwq7n2a", "content": "", "creation_timestamp": "2025-02-06T18:26:23.628424Z"}, {"uuid": "3861592a-ffa6-49f4-b711-4deb0c5506b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhtx7nglsf2e", "content": "", "creation_timestamp": "2025-02-10T20:10:04.777060Z"}, {"uuid": "49572e5a-54f6-49d0-89c1-2ffa6d0becdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk5k5k4m2i", "content": "", "creation_timestamp": "2025-02-10T16:16:15.064521Z"}, {"uuid": "5593eb62-2334-4518-ac99-6f8eefb875cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:41.861230Z"}, {"uuid": "972bc308-506a-4d83-83a8-2be0259105a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkpysb6jwf2e", "content": "", "creation_timestamp": "2025-03-19T10:43:19.112385Z"}, {"uuid": "2e152e2f-abde-4796-bafc-06075bbfb00d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12136", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkpysbbwln2n", "content": "", "creation_timestamp": "2025-03-19T10:43:19.724519Z"}, {"uuid": "f5018003-06de-4867-aa78-95653bb7dfcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12130", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-152/", "content": "", "creation_timestamp": "2025-03-18T04:00:00.000000Z"}, {"uuid": "69c8deee-638d-456f-b689-9d5ce40f7a08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupievbyrh2y", "content": "", "creation_timestamp": "2025-07-24T12:01:27.213869Z"}, {"uuid": "90b4fd69-096c-4f84-b4a5-b81fa5bb8464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "2159708e-c172-482c-b4c3-5157429f7a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://t.me/cvedetector/17577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12133 - Git - Libtasn1 Infinite Loop Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-12133 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:54.000000Z"}, {"uuid": "8dec4635-9a4d-46b3-a008-4cd02e09e7b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "25a2a6a3-100d-4288-b0fe-b5fed11c6ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12136", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12136\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Missing Critical Step in Authentication vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Authentication Bypass.This issue affects ANKA JPD-00028: through 19.03.2025.\n\nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.\n\ud83d\udccf Published: 2025-03-19T08:35:14.671Z\n\ud83d\udccf Modified: 2025-03-19T08:35:14.671Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-03-19T08:48:59.000000Z"}, {"uuid": "25e20539-7181-491c-b0b0-1e120fc74a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12131", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/426", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12131\n\ud83d\udd39 Description: The WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.5 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit resumes for other applicants when applying for jobs.\n\ud83d\udccf Published: 2025-01-07T12:43:40.934Z\n\ud83d\udccf Modified: 2025-01-07T12:43:40.934Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/b4772ab0-41cd-4b35-bda9-d72e0fd7b7a5?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-job-portal/tags/2.2.6/modules/jobapply/model.php?rev=3216415", "creation_timestamp": "2025-01-07T13:37:04.000000Z"}, {"uuid": "b4fcbdb6-af56-4561-ad9a-d7ce17d0ce38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4885", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12133\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.\n\ud83d\udccf Published: 2025-02-10T15:28:03.193Z\n\ud83d\udccf Modified: 2025-02-21T13:06:53.278Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12133\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344611\n3. https://gitlab.com/gnutls/libtasn1/-/issues/52", "creation_timestamp": "2025-02-21T13:18:12.000000Z"}, {"uuid": "48bedb56-6012-4aa2-ba0f-81680a10b70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12137\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.\n\n\nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.\n\ud83d\udccf Published: 2025-03-19T08:32:38.226Z\n\ud83d\udccf Modified: 2025-03-19T08:32:38.226Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-03-19T08:49:00.000000Z"}, {"uuid": "544e5ec5-d643-42f1-83d4-980d87f27ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12133\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.\n\ud83d\udccf Published: 2025-02-10T15:28:03.193Z\n\ud83d\udccf Modified: 2025-04-01T16:48:00.988Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12133\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344611\n3. https://gitlab.com/gnutls/libtasn1/-/issues/52", "creation_timestamp": "2025-04-01T17:32:37.000000Z"}, {"uuid": "d9e48fb2-07f0-456d-a830-0bf21571c5ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12136", "type": "seen", "source": "https://t.me/cvedetector/20632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12136 - Elfatek Elektronics ANKA JPD-00028 Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12136 \nPublished : March 19, 2025, 9:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Missing Critical Step in Authentication vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Authentication Bypass.This issue affects ANKA JPD-00028: through 19.03.2025.  \n  \nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available. \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T12:08:29.000000Z"}, {"uuid": "03d668c6-379b-49c9-940e-fd382af1147d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12136", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12136\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Missing Critical Step in Authentication vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Authentication Bypass.This issue affects ANKA JPD-00028: before V.01.01.\n\ud83d\udccf Published: 2025-03-19T08:35:14.671Z\n\ud83d\udccf Modified: 2025-06-27T11:31:03.913Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-06-27T11:50:13.000000Z"}, {"uuid": "044fdf6f-2eb2-4543-9fa3-b580e526e201", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12137\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: before V.01.01.\n\ud83d\udccf Published: 2025-03-19T08:32:38.226Z\n\ud83d\udccf Modified: 2025-06-27T11:30:10.384Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-06-27T11:50:14.000000Z"}, {"uuid": "02493878-6fc0-4147-9b2e-28544a3dffd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/cvedetector/20629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12137 - Elfatek Elektronics ANKA JPD-00028 Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-12137 \nPublished : March 19, 2025, 9:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.  \n  \n  \nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T12:08:27.000000Z"}, {"uuid": "d4e67d2c-6dd2-418d-94ee-9a9cc58a5008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12131", "type": "seen", "source": "https://t.me/cvedetector/14542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12131 - WordPress WP Job Portal Insecure Direct Object Reference\", \n  \"Content\": \"CVE ID : CVE-2024-12131 \nPublished : Jan. 7, 2025, 1:15 p.m. | 21\u00a0minutes ago \nDescription : The WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.5 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit resumes for other applicants when applying for jobs. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T14:42:45.000000Z"}, {"uuid": "dfaaa563-cdfd-4f43-af0c-b3779385c256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12130", "type": "seen", "source": "https://t.me/cvedetector/12129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12130 - An \u201cout of bounds read\u201d code execution vulnerabili\", \n  \"Content\": \"CVE ID : CVE-2024-12130 \nPublished : Dec. 5, 2024, 6:15 p.m. | 38\u00a0minutes ago \nDescription : An \u201cout of bounds read\u201d code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae  \n  \n that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T20:22:52.000000Z"}, {"uuid": "8a9438fb-6a43-472c-af9f-e3146ecb06d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12132", "type": "seen", "source": "https://t.me/cvedetector/14217", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12132 - Wordpress Job Portal - Insecure Direct Object Reference (IDOR) in WP Job Portal Plugin\", \n  \"Content\": \"CVE ID : CVE-2024-12132 \nPublished : Jan. 3, 2025, 9:15 a.m. | 42\u00a0minutes ago \nDescription : The WP Job Portal \u2013 A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.4 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create jobs for companies that are unaffiliated with the attacker. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T11:09:58.000000Z"}, {"uuid": "ca107210-b4a1-4ce9-9f79-0fbc7ea8b203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12138", "type": "seen", "source": "https://t.me/cvedetector/11991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12138 - A vulnerability classified as critical was found i\", \n  \"Content\": \"CVE ID : CVE-2024-12138 \nPublished : Dec. 4, 2024, 2:15 p.m. | 31\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in horilla up to 1.2.1. This vulnerability affects the function request_new/get_employee_shift/create_reimbursement/key_result_current_value_update/create_meetings/create_skills. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T15:55:04.000000Z"}, {"uuid": "1075c935-f5c5-4420-8cd2-840d3a259721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "Telegram/fjjOxxWjkfg9qUXECIHsvuyBdyIQzH60wabWSFmc2xlT4Msi", "content": "", "creation_timestamp": "2025-02-21T15:03:13.000000Z"}]}