{"vulnerability": "CVE-2024-1222", "sightings": [{"uuid": "14c53fa4-80bd-4d70-bb10-1359c4166104", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12220", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113666985358645445", "content": "", "creation_timestamp": "2024-12-17T07:29:13.507870Z"}, {"uuid": "869f8cca-c9e1-416d-a4c7-c182c01100f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12222", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfckgvaysr2a", "content": "", "creation_timestamp": "2025-01-09T11:15:49.877355Z"}, {"uuid": "df9b9e7b-92a9-4cff-a72a-a658ae67a0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12222", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798223220140152", "content": "", "creation_timestamp": "2025-01-09T11:44:44.366900Z"}, {"uuid": "0054770b-d4c9-42fe-983f-7058e00e07fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12226", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lftqbzgysj2p", "content": "", "creation_timestamp": "2025-01-16T07:15:45.077527Z"}, {"uuid": "43c1b302-63a4-472d-b9a2-7f5f483f8802", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12226", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lftrkjqm5c25", "content": "", "creation_timestamp": "2025-01-16T07:38:24.003405Z"}, {"uuid": "2b0fa817-f810-4cd4-b666-417e8a10ca7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12226", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113836704921373684", "content": "", "creation_timestamp": "2025-01-16T06:51:08.496521Z"}, {"uuid": "a152cecf-774d-4b39-8393-94abba61c758", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12221", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113769365715143941", "content": "", "creation_timestamp": "2025-01-04T09:26:04.948350Z"}, {"uuid": "348e8ab7-597d-4d66-9bdc-039202f70bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12227", "type": "published-proof-of-concept", "source": "Telegram/OHr82OtRsE7SrX-5JX0BTKOCwGseELWPcAGkyhObfyZN6dU", "content": "", "creation_timestamp": "2025-12-14T15:00:08.000000Z"}, {"uuid": "7fa0ec4e-a8ad-4018-bdc4-bcfd363ab22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12224", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqe7grq375t2", "content": "", "creation_timestamp": "2025-05-30T02:41:30.695955Z"}, {"uuid": "82645050-1c5b-44d2-9d22-61afd0da44ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12224", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqeknad7p627", "content": "", "creation_timestamp": "2025-05-30T06:01:50.288079Z"}, {"uuid": "57753efd-2d3a-4284-9b90-9d9762171712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12224", "type": "seen", "source": "https://gist.github.com/keohanoi/e94348e5545a30f4a6bc3febfc24df4f", "content": "", "creation_timestamp": "2025-09-12T03:04:47.000000Z"}, {"uuid": "f87503d8-d200-4b44-95b0-8cd697f738e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojwinmu3w22", "content": "", "creation_timestamp": "2025-05-06T22:26:58.944470Z"}, {"uuid": "2791f87b-c6af-4cb8-afe0-ae3edaa29aea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12222", "type": "seen", "source": "https://t.me/cvedetector/14846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12222 - Shipos for WooCommerce Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12222 \nPublished : Jan. 9, 2025, 11:15 a.m. | 22\u00a0minutes ago \nDescription : The Deliver via Shipos for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018dvsfw_bulk_label_url\u2019 parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T12:44:59.000000Z"}, {"uuid": "812b8aa2-a4cc-47df-89b4-1b7e7f53456a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15216", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12225\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.\n\ud83d\udccf Published: 2025-05-06T19:49:16.502Z\n\ud83d\udccf Modified: 2025-05-06T19:49:16.502Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12225\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2330484", "creation_timestamp": "2025-05-06T20:21:20.000000Z"}, {"uuid": "2f4c5c8b-99be-4731-96b6-2998598f4a8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12226", "type": "seen", "source": "https://t.me/cvedetector/15570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12226 - Octopus Kubernetes Worker Text-based Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-12226 \nPublished : Jan. 16, 2025, 7:15 a.m. | 19\u00a0minutes ago \nDescription : In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T08:42:27.000000Z"}, {"uuid": "0c147c4a-5fc7-40c2-adf3-fa316a9b269b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12221", "type": "seen", "source": "https://t.me/cvedetector/14273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12221 - Turnkey bbPress by WeaverTheme WordPress Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12221 \nPublished : Jan. 4, 2025, 10:15 a.m. | 39\u00a0minutes ago \nDescription : The Turnkey bbPress by WeaverTheme plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018_wpnonce\u2019 parameter in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T12:14:58.000000Z"}, {"uuid": "d807269c-6f5f-46a7-9fed-60fe15b22d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12221", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/111", "content": "\ud83d\udccc **CVE ID**: GHSA-cvj8-48rm-vmhr\n\ud83d\udd17 **Aliases**: CVE-2024-12221\n\ud83d\udd39 **Details**: The Turnkey bbPress by WeaverTheme plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018_wpnonce\u2019 parameter in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T12:30:32Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T12:30:32Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-79\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12221\n2. https://plugins.trac.wordpress.org/changeset/320943\n3. https://wordpress.org/plugins/weaver-for-bbpress\n4. https://www.wordfence.com/threat-intel/vulnerabilities/id/35c608c3-9c28-4e0d-b0ec-d0a29fccd3b?source=cve", "creation_timestamp": "2025-01-05T01:39:23.000000Z"}, {"uuid": "9efcba4b-47d2-475c-8786-aa9ff5666f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12222", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12222\n\ud83d\udd39 Description: The Deliver via Shipos for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018dvsfw_bulk_label_url\u2019 parameter in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-09T11:10:55.725Z\n\ud83d\udccf Modified: 2025-01-09T11:10:55.725Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/377afb95-02d9-46b9-936d-3d58257dd928?source=cve\n2. https://wordpress.org/plugins/wc-shipos-delivery/#developers", "creation_timestamp": "2025-01-09T12:16:52.000000Z"}, {"uuid": "a4772b72-c979-4f3d-8900-35384c95a129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1924", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12226\n\ud83d\udd39 Description: In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly.\n\ud83d\udccf Published: 2025-01-16T06:48:20.279Z\n\ud83d\udccf Modified: 2025-01-16T06:48:20.279Z\n\ud83d\udd17 References:\n1. https://advisories.octopus.com/post/2024/sa2024-10/", "creation_timestamp": "2025-01-16T06:55:17.000000Z"}, {"uuid": "7a80a413-3da9-4f6e-8508-528d0a9d19a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12229", "type": "seen", "source": "https://t.me/cvedetector/12107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12229 - A vulnerability classified as critical was found i\", \n  \"Content\": \"CVE ID : CVE-2024-12229 \nPublished : Dec. 5, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in PHPGurukul Complaint Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T17:02:04.000000Z"}, {"uuid": "bf2a361d-8997-4a1b-a509-2d3f449985b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12220", "type": "seen", "source": "https://t.me/cvedetector/13074", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12220 - \"WooCommerce SMS CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-12220 \nPublished : Dec. 17, 2024, 8:15 a.m. | 43\u00a0minutes ago \nDescription : The SMS for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.1. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T10:05:36.000000Z"}, {"uuid": "4eca710e-b830-489a-adb3-fe21560b97b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12227", "type": "seen", "source": "https://t.me/cvedetector/12106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12227 - A vulnerability, which was classified as problemat\", \n  \"Content\": \"CVE ID : CVE-2024-12227 \nPublished : Dec. 5, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T16:11:53.000000Z"}, {"uuid": "d7ef95ee-aefd-4a07-8b3d-aed0485d2975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12228", "type": "seen", "source": "https://t.me/cvedetector/12104", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12228 - A vulnerability classified as critical has been fo\", \n  \"Content\": \"CVE ID : CVE-2024-12228 \nPublished : Dec. 5, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T16:11:51.000000Z"}, {"uuid": "934ca6d7-c3d6-4eee-a885-abeb0b464c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1222", "type": "seen", "source": "https://t.me/ctinow/207429", "content": "https://ift.tt/X9EZqI7\nCVE-2024-1222", "creation_timestamp": "2024-03-14T04:26:44.000000Z"}, {"uuid": "bd66ad56-bb22-4e5f-a1dc-974b2fac8c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1222", "type": "seen", "source": "https://t.me/ctinow/207418", "content": "https://ift.tt/X9EZqI7\nCVE-2024-1222", "creation_timestamp": "2024-03-14T04:21:48.000000Z"}, {"uuid": "ce286893-69c3-477f-a99c-f37e9d76fd32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12225", "type": "seen", "source": "https://t.me/cvedetector/24656", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12225 - Quarkus WebAuthn Default Endpoints Information Disclosure and Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-12225 \nPublished : May 6, 2025, 8:15 p.m. | 2\u00a0hours ago \nDescription : A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T00:31:32.000000Z"}]}