{"vulnerability": "CVE-2024-1221", "sightings": [{"uuid": "0fc687b6-34a9-4be7-a593-33808e1db0d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12212", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-05", "content": "", "creation_timestamp": "2024-12-10T11:00:00.000000Z"}, {"uuid": "e38b1e35-5fbe-4c19-ad91-23bef2a49c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12212", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113642778567397779", "content": "", "creation_timestamp": "2024-12-13T00:53:07.178998Z"}, {"uuid": "d17e3d85-e02d-42f6-9f46-a2816d7a092f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12219", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113666985342334739", "content": "", "creation_timestamp": "2024-12-17T07:29:13.283241Z"}, {"uuid": "0753f768-a2db-40eb-998f-6f4f4384e6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12210", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706144911930667", "content": "", "creation_timestamp": "2024-12-24T05:28:01.201665Z"}, {"uuid": "dcd84c98-de7d-400b-a038-8f97fb02c6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12210", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldzs7vtf2o2i", "content": "", "creation_timestamp": "2024-12-24T06:15:56.324295Z"}, {"uuid": "ef2ffc4b-aceb-4208-81a7-3b70ee6e45b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12218", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckgsujlh2e", "content": "", "creation_timestamp": "2025-01-09T11:15:47.383275Z"}, {"uuid": "d13db46e-8773-4ef7-bf62-dad46534a677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12214", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4vgt3bre2e", "content": "", "creation_timestamp": "2025-01-07T05:16:40.595562Z"}, {"uuid": "d67033b0-af06-4c77-874c-3caa267fbba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12218", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798223205803958", "content": "", "creation_timestamp": "2025-01-09T11:44:44.228273Z"}, {"uuid": "d8624cdd-b828-4d69-9340-74596c318f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12211", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfq2ekq2k525", "content": "", "creation_timestamp": "2025-01-14T20:05:28.573728Z"}, {"uuid": "f92e01e4-9255-468d-97ac-a8a8a756f601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12211", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113821973916547863", "content": "", "creation_timestamp": "2025-01-13T16:24:51.216060Z"}, {"uuid": "dca1476e-1b4c-45aa-a29e-b4e0dd59cc96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990205008091860", "content": "", "creation_timestamp": "2025-02-12T09:28:13.944140Z"}, {"uuid": "20a1c347-1edf-4dec-a537-1e4239f29f90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwwmn3tj2x", "content": "", "creation_timestamp": "2025-02-12T10:15:40.519991Z"}, {"uuid": "8413cfa3-585c-4f38-9b51-65d4663f5b5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113990520210402386", "content": "", "creation_timestamp": "2025-02-12T10:48:23.944571Z"}, {"uuid": "f2e4a00d-bd5f-480d-a960-25183f0ef7a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxzp6sy562h", "content": "", "creation_timestamp": "2025-02-12T11:05:12.398575Z"}, {"uuid": "c2cab996-21b2-4111-9ca8-fd1624fabd8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsuzw7u22", "content": "", "creation_timestamp": "2025-02-13T02:02:04.656797Z"}, {"uuid": "168e7b18-f9e2-4aeb-ab2c-109c5e82d85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoy2dad2s", "content": "", "creation_timestamp": "2025-02-13T15:25:10.892592Z"}, {"uuid": "876ece76-9fa6-45ea-87c7-99d352043a89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1221", "type": "seen", "source": "https://gist.github.com/falconwebsites/099fbf1928b96af4c5e40d257675ebab", "content": "", "creation_timestamp": "2025-05-22T16:51:14.000000Z"}, {"uuid": "ab111a71-66b4-4b21-95a7-f199d3469aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12214", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/458", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12214\n\ud83d\udd39 Description: The WooCommerce HSS Extension for Streaming Video plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018videolink\u2019 parameter in all versions up to, and including, 3.31 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-07T04:21:57.210Z\n\ud83d\udccf Modified: 2025-01-07T16:25:22.605Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/1d633f71-3b2b-4fe3-80f1-4c2dcc86313c?source=cve\n2. https://wordpress.org/plugins/woocommerce-hss-extension-for-streaming-video/#developers", "creation_timestamp": "2025-01-07T16:39:11.000000Z"}, {"uuid": "93390a94-2e17-4f03-97c1-8c3c8789526f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12218", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12218\n\ud83d\udd39 Description: The Woocommerce check pincode/zipcode for shipping plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.4. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-09T11:10:58.656Z\n\ud83d\udccf Modified: 2025-01-09T11:10:58.656Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5b79b5ae-7ce5-4065-8d7c-487df6752bc7?source=cve\n2. https://plugins.trac.wordpress.org/browser/woocommerce-check-pincode-zipcode-for-shipping/trunk/classes/pincode-list.php#L93\n3. https://wordpress.org/plugins/woocommerce-check-pincode-zipcode-for-shipping/#developers", "creation_timestamp": "2025-01-09T12:16:21.000000Z"}, {"uuid": "80d2a0d5-fc39-48c9-8433-10ce1e7233cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4078", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:08.737\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://themeforest.net/item/superio-job-board-wordpress-theme/32180231\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve", "creation_timestamp": "2025-02-12T11:12:39.000000Z"}, {"uuid": "08bc8468-d971-4a3e-88f2-b271ccca5b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4100", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12213\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites.\n\ud83d\udccf Published: 2025-02-12T12:30:46Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12213\n2. https://themeforest.net/item/superio-job-board-wordpress-theme/32180231\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve", "creation_timestamp": "2025-02-12T13:14:07.000000Z"}, {"uuid": "6bfbe273-265d-48ae-9c1b-dd0890253b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12215", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8181", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12215\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: In kedro-org/kedro version 0.19.8, the `pull_package()` API function allows users to download and extract micro packages from the Internet. However, the function `project_wheel_metadata()` within the code path can execute the `setup.py` file inside the tar file, leading to remote code execution (RCE) by running arbitrary commands on the victim's machine.\n\ud83d\udccf Published: 2025-03-20T10:11:39.404Z\n\ud83d\udccf Modified: 2025-03-20T10:11:39.404Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/fad27503-97a4-4933-91d4-96223b8c54d8", "creation_timestamp": "2025-03-20T10:19:18.000000Z"}, {"uuid": "052d2b01-e747-41a5-aded-f840f02b6459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "https://t.me/cvedetector/17849", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12213 - \"WordPress WP Job Board Pro Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12213 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:56.000000Z"}, {"uuid": "d4015de3-8eb6-4567-9b02-2d57903baaef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12211", "type": "seen", "source": "https://t.me/cvedetector/15161", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12211 - Pega Platform Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12211 \nPublished : Jan. 13, 2025, 5:15 p.m. | 20\u00a0minutes ago \nDescription : Pega Platform versions 8.1 to Infinity 24.2.0 are affected by an Stored XSS issue with profile. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T18:45:02.000000Z"}, {"uuid": "65297de6-2f8e-4acd-814f-3971dadce4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12214", "type": "seen", "source": "https://t.me/cvedetector/14463", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12214 - WooCommerce HSS Extension for Streaming Video WordPress Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12214 \nPublished : Jan. 7, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : The WooCommerce HSS Extension for Streaming Video plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018videolink\u2019 parameter in all versions up to, and including, 3.31 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T07:10:24.000000Z"}, {"uuid": "0306b956-7337-440c-961d-7fccc439d544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12218", "type": "seen", "source": "https://t.me/cvedetector/14845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12218 - Woocommerce Shipping Plugin CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-12218 \nPublished : Jan. 9, 2025, 11:15 a.m. | 22\u00a0minutes ago \nDescription : The Woocommerce check pincode/zipcode for shipping plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.4. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T12:44:59.000000Z"}, {"uuid": "57dc90ae-0341-4560-b46a-fa676d0415ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12210", "type": "seen", "source": "https://t.me/cvedetector/13569", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12210 - WooCommerce Print Invoice Accessibility Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12210 \nPublished : Dec. 24, 2024, 6:15 a.m. | 17\u00a0minutes ago \nDescription : The Print Invoice &amp; Delivery Notes for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wcdn_remove_shoplogo' AJAX action in all versions up to, and including, 5.4.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to remove the shop's logo. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T07:42:49.000000Z"}, {"uuid": "2e0f2fa3-a789-4c6b-857c-3deae8e670ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12219", "type": "seen", "source": "https://t.me/cvedetector/13075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12219 - WordPress Stop Registration Spam CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-12219 \nPublished : Dec. 17, 2024, 8:15 a.m. | 43\u00a0minutes ago \nDescription : The Stop Registration Spam plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T10:05:37.000000Z"}, {"uuid": "2da9f0f5-d1e0-4ab7-b71e-4b7a59118f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12212", "type": "seen", "source": "https://t.me/cvedetector/12817", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12212 - Apache CSP File validation Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12212 \nPublished : Dec. 13, 2024, 1:15 a.m. | 37\u00a0minutes ago \nDescription : The vulnerability occurs in the parsing of CSP files. The issues result   \nfrom the lack of proper validation of user-supplied data, which could   \nallow reading past the end of allocated data structures, resulting in   \nexecution of arbitrary code. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T03:13:21.000000Z"}, {"uuid": "47e98ef3-232a-4f64-bf1d-6a172f0e8109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "Telegram/RetDTQe4gf9XidjLfj0lnA2pVG--nwXh-AhkRjnrpVj0ANMA", "content": "", "creation_timestamp": "2025-02-20T23:26:55.000000Z"}, {"uuid": "6ac6f29a-f0aa-42e7-9d28-95197dae5dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12213", "type": "seen", "source": "Telegram/ywR1DiyQtSb_DrEJKa7u6yfUtOVJG56e-GjYAA9u-_Wj4NHH", "content": "", "creation_timestamp": "2025-02-14T10:04:58.000000Z"}, {"uuid": "0f00ce4a-b129-4707-9023-89fa15cd9df9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1221", "type": "seen", "source": "https://t.me/ctinow/207428", "content": "https://ift.tt/Kv1laWD\nCVE-2024-1221", "creation_timestamp": "2024-03-14T04:26:43.000000Z"}, {"uuid": "9884838a-5c24-4ec9-9d60-8eb12537ffbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1221", "type": "seen", "source": "https://t.me/ctinow/207417", "content": "https://ift.tt/Kv1laWD\nCVE-2024-1221", "creation_timestamp": "2024-03-14T04:21:47.000000Z"}]}