{"vulnerability": "CVE-2024-1218", "sightings": [{"uuid": "04ee434a-55e8-4af8-9e1c-2103a6fce103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12188", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113597384217334031", "content": "", "creation_timestamp": "2024-12-05T00:28:44.524108Z"}, {"uuid": "2f6e418f-4084-4856-9bc8-d279c2f2aa14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12182", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113596953459533175", "content": "", "creation_timestamp": "2024-12-04T22:39:11.397923Z"}, {"uuid": "79c88e7c-9897-4557-9da9-531a4a43b8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12187", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113597384202826312", "content": "", "creation_timestamp": "2024-12-05T00:29:04.909687Z"}, {"uuid": "f7146a13-0d91-4fa4-a9ec-0f9c4d79664e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12185", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113597230481687138", "content": "", "creation_timestamp": "2024-12-04T23:49:38.703740Z"}, {"uuid": "9b530c62-9589-4b17-8706-829f9704123e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12183", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113597060800717377", "content": "", "creation_timestamp": "2024-12-04T23:06:29.392341Z"}, {"uuid": "7f993074-85a5-40aa-93d0-64277475b8b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12180", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113596828606242355", "content": "", "creation_timestamp": "2024-12-04T22:07:26.748765Z"}, {"uuid": "0968f59c-a7ba-4794-b75b-dd8e17e71e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12186", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113597230495654977", "content": "", "creation_timestamp": "2024-12-04T23:49:38.764268Z"}, {"uuid": "bf1a0359-c3ea-4d9b-9189-e381cdb7f140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12181", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113596828620055164", "content": "", "creation_timestamp": "2024-12-04T22:07:26.987693Z"}, {"uuid": "14fec1bf-4f7f-4bcf-ba42-3a1b6d9521de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12184", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh3np5fh7m2i", "content": "", "creation_timestamp": "2025-02-01T04:15:53.525754Z"}, {"uuid": "c7ce35ae-2d5e-4f29-846f-262d17eee668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3714", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-01T04:15:30.443\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3231363%40contact-forms&amp;new=3231363%40contact-forms&amp;sfp_email=&amp;sfph_mail=\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3232168%40contact-forms&amp;new=3232168%40contact-forms&amp;sfp_email=&amp;sfph_mail=\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/695df547-f068-4ac1-926f-80dbf75632dd?source=cve", "creation_timestamp": "2025-02-01T05:25:51.000000Z"}, {"uuid": "9adf7a94-3db5-46cc-9a84-2a92c99e7869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12184\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the accua_forms_download_submitted_file() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to download other user submitted forms.\n\ud83d\udccf Published: 2025-02-01T06:31:00Z\n\ud83d\udccf Modified: 2025-02-01T06:31:00Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12184\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3231363%40contact-forms&amp;new=3231363%40contact-forms&amp;sfp_email=&amp;sfph_mail=\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3232168%40contact-forms&amp;new=3232168%40contact-forms&amp;sfp_email=&amp;sfph_mail=\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/695df547-f068-4ac1-926f-80dbf75632dd?source=cve", "creation_timestamp": "2025-02-01T07:16:31.000000Z"}, {"uuid": "b69aa91f-ccfb-4991-9771-aca78649420b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12189", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9864", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12189\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WDesignKit \u2013 Elementor &amp; Gutenberg Starter Templates, Patterns, Cloud Workspace &amp; Widget Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom widgets in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-04-01T06:52:04.579Z\n\ud83d\udccf Modified: 2025-04-01T06:52:04.579Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2e936214-ee25-4763-ba7a-b5308cc09a57?source=cve\n2. https://wordpress.org/plugins/wdesignkit/#developers", "creation_timestamp": "2025-04-01T07:32:12.000000Z"}, {"uuid": "13d135e9-0191-4630-8da0-d45af7e13574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12189", "type": "seen", "source": "https://t.me/cvedetector/21741", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12189 - WDesignKit WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12189 \nPublished : April 1, 2025, 7:15 a.m. | 2\u00a0hours, 12\u00a0minutes ago \nDescription : The WDesignKit \u2013 Elementor &amp; Gutenberg Starter Templates, Patterns, Cloud Workspace &amp; Widget Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom widgets in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T11:57:27.000000Z"}, {"uuid": "3540e7ce-dab9-4b36-81b9-dfa50dcdea3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12184", "type": "seen", "source": "https://t.me/cvedetector/17000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12184 - Cimatti WordPress Contact Forms Remote File Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12184 \nPublished : Feb. 1, 2025, 4:15 a.m. | 2\u00a0hours, 21\u00a0minutes ago \nDescription : The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the accua_forms_download_submitted_file() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to download other user submitted forms. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-01T08:07:28.000000Z"}, {"uuid": "355e9dbd-acc1-4a24-9f26-1cf872051232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12187", "type": "seen", "source": "https://t.me/cvedetector/12059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12187 - A vulnerability was found in 1000 Projects Library\", \n  \"Content\": \"CVE ID : CVE-2024-12187 \nPublished : Dec. 5, 2024, 1:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T02:48:31.000000Z"}, {"uuid": "55ccd221-02bd-4583-8da3-e94e7799c86b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12188", "type": "seen", "source": "https://t.me/cvedetector/12058", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12188 - A vulnerability was found in 1000 Projects Library\", \n  \"Content\": \"CVE ID : CVE-2024-12188 \nPublished : Dec. 5, 2024, 1:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T02:48:31.000000Z"}, {"uuid": "aae88879-fa13-4343-a6bb-35d23882d795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12181", "type": "seen", "source": "https://t.me/cvedetector/12036", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12181 - A vulnerability classified as problematic was foun\", \n  \"Content\": \"CVE ID : CVE-2024-12181 \nPublished : Dec. 4, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T00:17:46.000000Z"}, {"uuid": "d4790876-4bc4-4113-941b-0dee37f99434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12185", "type": "seen", "source": "https://t.me/cvedetector/12049", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12185 - A vulnerability has been found in code-projects Ho\", \n  \"Content\": \"CVE ID : CVE-2024-12185 \nPublished : Dec. 5, 2024, 12:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Hotel Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Administrator Login Password Handler. The manipulation of the argument Str2 leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T01:58:13.000000Z"}, {"uuid": "e3c30450-8498-4ed5-ad72-55a9aca2390b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12186", "type": "seen", "source": "https://t.me/cvedetector/12043", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12186 - A vulnerability was found in code-projects Hotel M\", \n  \"Content\": \"CVE ID : CVE-2024-12186 \nPublished : Dec. 5, 2024, 12:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Hotel Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file hotelnew.c of the component Available Room Handler. The manipulation of the argument admin_entry leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T01:58:06.000000Z"}, {"uuid": "352b8464-e54e-4eb4-aa03-a90fe2d42cb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12182", "type": "seen", "source": "https://t.me/cvedetector/12041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12182 - A vulnerability, which was classified as problemat\", \n  \"Content\": \"CVE ID : CVE-2024-12182 \nPublished : Dec. 4, 2024, 11:15 p.m. | 37\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T01:07:58.000000Z"}, {"uuid": "4546445b-6409-44d4-8110-3f96e9e654c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12183", "type": "seen", "source": "https://t.me/cvedetector/12039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12183 - A vulnerability, which was classified as problemat\", \n  \"Content\": \"CVE ID : CVE-2024-12183 \nPublished : Dec. 4, 2024, 11:15 p.m. | 37\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T01:07:57.000000Z"}, {"uuid": "432e7620-39e2-44e0-a275-f0e22b61bf09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12180", "type": "seen", "source": "https://t.me/cvedetector/12037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12180 - A vulnerability classified as problematic has been\", \n  \"Content\": \"CVE ID : CVE-2024-12180 \nPublished : Dec. 4, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T00:17:47.000000Z"}, {"uuid": "5e249d6c-c9e2-48ef-8c7b-41dbd8041182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1218", "type": "seen", "source": "https://t.me/ctinow/203638", "content": "https://ift.tt/X1jn9HI\nCVE-2024-1218 | kaliforms Contact Form Builder with Drag &amp; Drop Plugin up to 2.3.41 on WordPress REST Endpoint authorization (ID 3036466)", "creation_timestamp": "2024-03-08T22:56:38.000000Z"}]}