{"vulnerability": "CVE-2024-1246", "sightings": [{"uuid": "db0115cd-f639-4d64-ac41-f93cf9c446c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12461", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637984702888114", "content": "", "creation_timestamp": "2024-12-12T04:33:58.627825Z"}, {"uuid": "dbc7ddb4-9921-4558-bcc4-7e01d3477b2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12465", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644718482766295", "content": "", "creation_timestamp": "2024-12-13T09:06:28.313676Z"}, {"uuid": "78d064b6-8d4c-4a56-be6d-9aca3ee1ee5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12469", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667467509014864", "content": "", "creation_timestamp": "2024-12-17T09:31:53.899317Z"}, {"uuid": "a85d006f-743d-4cac-bbcf-b96da7ae85a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12469", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667480613404199", "content": "", "creation_timestamp": "2024-12-17T09:35:10.559622Z"}, {"uuid": "a308e328-2f47-4061-9ab0-9e39bfd10dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12469", "type": "seen", "source": "https://social.circl.lu/users/vulnerability_lookup/statuses/113667616547179569", "content": "", "creation_timestamp": "2024-12-17T10:10:08.535720Z"}, {"uuid": "82b4d60f-38cc-493e-add0-ad47b7348430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12468", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113706832024562575", "content": "", "creation_timestamp": "2024-12-24T08:22:45.637633Z"}, {"uuid": "da1fbea3-bb86-4c6d-a700-122d63a30d6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12468", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le24ay3j2f2a", "content": "", "creation_timestamp": "2024-12-24T09:15:30.031137Z"}, {"uuid": "9048c406-de87-41e9-aad3-0ada664ffcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12464", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf4zpo4pj22g", "content": "", "creation_timestamp": "2025-01-07T06:33:16.805309Z"}, {"uuid": "d0444d95-f053-44bd-91c8-775ae5d57191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12462", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4vi5xuu625", "content": "", "creation_timestamp": "2025-01-07T05:17:25.322910Z"}, {"uuid": "86445760-829f-414e-aa6e-ba6a805f7d84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12464", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf4yrg7gi525", "content": "", "creation_timestamp": "2025-01-07T06:16:17.175768Z"}, {"uuid": "d9a1cf5a-76d7-465e-87ae-f3680e2d3dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12464", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785617251037285", "content": "", "creation_timestamp": "2025-01-07T06:18:52.499538Z"}, {"uuid": "c177c376-d192-4dee-9829-c4faf5b3ce1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12466", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113842412594599964", "content": "", "creation_timestamp": "2025-01-17T07:02:40.704919Z"}, {"uuid": "94be69b0-d954-491e-8721-8a1d88aedb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12466", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfwar33irh2s", "content": "", "creation_timestamp": "2025-01-17T07:15:48.884152Z"}, {"uuid": "fce1b8a4-abf7-4cba-87c5-d65e1523ae40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12466", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfwc2d7gme2w", "content": "", "creation_timestamp": "2025-01-17T07:38:53.664528Z"}, {"uuid": "8fb4657e-bd79-40a2-9674-21d26e90b7f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12464", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/340", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12464\n\ud83d\udd39 Description: The Chatroll Live Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'chatroll' shortcode in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-01-07T05:23:55.106Z\n\ud83d\udccf Modified: 2025-01-07T05:23:55.106Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/87fdadcd-b776-471a-9756-708e384de4f0?source=cve\n2. https://plugins.trac.wordpress.org/browser/chatroll-live-chat/tags/2.5.0/chatroll.php#L62", "creation_timestamp": "2025-01-07T05:38:32.000000Z"}, {"uuid": "00df30c7-1338-4204-a9bd-782607176726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12460", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljtoshv7la2n", "content": "", "creation_timestamp": "2025-03-08T04:29:56.085185Z"}, {"uuid": "03954b5c-aa35-44c2-bbfe-d54296ac9e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12460", "type": "seen", "source": "https://t.me/cvedetector/19880", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12460 - WordPress Timeless Texts Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12460 \nPublished : March 8, 2025, 3:15 a.m. | 2\u00a0hours, 19\u00a0minutes ago \nDescription : The Years Since \u2013 Timeless Texts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'years-since' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-08T06:49:40.000000Z"}, {"uuid": "5a9c8662-71aa-4a89-91be-7bc59ef78a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12467", "type": "seen", "source": "https://t.me/cvedetector/18709", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12467 - Redsys Pago WordPress Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12467 \nPublished : Feb. 22, 2025, 5:15 a.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : The Pago por Redsys plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'Ds_MerchantParameters' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T08:18:43.000000Z"}, {"uuid": "68b21abb-7b80-4573-b51a-682223279f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12462", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/453", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12462\n\ud83d\udd39 Description: The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-01-07T04:21:55.629Z\n\ud83d\udccf Modified: 2025-01-07T16:26:05.501Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/151b0aa9-c5c9-48ab-8b73-22ee42666824?source=cve\n2. https://plugins.trac.wordpress.org/browser/yogo-booking/trunk/src/shortcodes.php#L13\n3. https://wordpress.org/plugins/yogo-booking", "creation_timestamp": "2025-01-07T16:37:42.000000Z"}, {"uuid": "f042a2fe-e17d-4063-b2f6-c727c40a29ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12466", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12466\n\ud83d\udd39 Description: The Proofreading plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-17T07:01:29.141Z\n\ud83d\udccf Modified: 2025-01-17T07:01:29.141Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f666a3-6287-4c9b-94d3-7bc457701af2?source=cve\n2. https://plugins.trac.wordpress.org/browser/proofreading/tags/1.2.1.1/admin/partials/proofreading-admin-display.php#L103\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3223417%40proofreading&amp;new=3223417%40proofreading&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-17T07:56:36.000000Z"}, {"uuid": "eedac3fd-e42e-4437-9379-18e912275a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12460", "type": "seen", "source": "Telegram/bzKCkVT6B2c3zAFjrqBZYZCDP-8q5zphN6tx5SkBW1Ph-VDU", "content": "", "creation_timestamp": "2025-03-08T04:37:51.000000Z"}, {"uuid": "406d8e91-9186-4443-bebc-34f498f8a09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5014", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12467\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Pago por Redsys plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'Ds_MerchantParameters' parameter in all versions up to, and including, 1.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-02-22T04:21:16.579Z\n\ud83d\udccf Modified: 2025-02-22T04:21:16.579Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/ed05cd81-ca21-41de-9b02-bd84498cd74e?source=cve\n2. https://plugins.trac.wordpress.org/browser/pago-redsys-tpv-grafreak/tags/1.0.13/public/partials/pago-redsys-grafreak-public-display.php#L82\n3. https://plugins.trac.wordpress.org/browser/pago-redsys-tpv-grafreak/tags/1.0.13/includes/class-redsysapi.php#L263\n4. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3215878%40pago-redsys-tpv-grafreak&amp;new=3215878%40pago-redsys-tpv-grafreak&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-02-22T05:18:49.000000Z"}, {"uuid": "3fc93c83-9c44-4ee1-8126-6fd02768fc28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12460", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6916", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12460\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Years Since \u2013 Timeless Texts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'years-since' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-03-08T02:24:02.760Z\n\ud83d\udccf Modified: 2025-03-08T02:24:02.760Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2f1cb71a-aabb-4ba1-93b4-24070aaa582b?source=cve\n2. https://plugins.trac.wordpress.org/browser/years-since/trunk/alar-years-since.php#L132\n3. https://wordpress.org/plugins/years-since", "creation_timestamp": "2025-03-08T02:35:29.000000Z"}, {"uuid": "99f6e581-cb42-4842-b585-6065c2cd6e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12466", "type": "seen", "source": "https://t.me/cvedetector/15686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12466 - WordPress Proofreading Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12466 \nPublished : Jan. 17, 2025, 7:15 a.m. | 42\u00a0minutes ago \nDescription : The Proofreading plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T09:15:56.000000Z"}, {"uuid": "221835da-be5b-4dc4-918d-c0372422eca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1246", "type": "seen", "source": "https://t.me/ctinow/182250", "content": "https://ift.tt/5s0XyWz\nCVE-2024-1246", "creation_timestamp": "2024-02-09T21:32:10.000000Z"}, {"uuid": "618d52a2-058f-43de-b5f7-a5138af18205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12464", "type": "seen", "source": "https://t.me/cvedetector/14476", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12464 - \"Chatroll WordPress Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-12464 \nPublished : Jan. 7, 2025, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Chatroll Live Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'chatroll' shortcode in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T08:00:42.000000Z"}, {"uuid": "88edca8f-47ff-4936-a63f-4da659c73f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12469", "type": "seen", "source": "https://t.me/cvedetector/13081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12469 - WordPress WP BASE Booking Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-12469 \nPublished : Dec. 17, 2024, 10:15 a.m. | 23\u00a0minutes ago \nDescription : The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018status\u2019 parameter in all versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T11:45:47.000000Z"}, {"uuid": "f0618195-0963-4450-8829-640083bf1555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12463", "type": "seen", "source": "https://t.me/cvedetector/12707", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12463 - \"Arena.IM Live Blogging for WordPress Stored Cross-Site Scripting (XSS)\"\", \n  \"Content\": \"CVE ID : CVE-2024-12463 \nPublished : Dec. 12, 2024, 5:15 a.m. | 43\u00a0minutes ago \nDescription : The Arena.IM \u2013 Live Blogging for real-time events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'arena_embed_amp' shortcode in all versions up to, and including, 0.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T07:07:52.000000Z"}, {"uuid": "1799ea7e-4acd-46f6-94c5-4c04999e38c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12461", "type": "seen", "source": "https://t.me/cvedetector/12691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12461 - WordPress Revive Adserver Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12461 \nPublished : Dec. 12, 2024, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The WP-Revive Adserver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wprevive_async' shortcode in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T06:17:25.000000Z"}, {"uuid": "86ad66cc-3e83-44b5-b7de-827847d188c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1246", "type": "seen", "source": "https://t.me/ctinow/198638", "content": "https://ift.tt/oLJqpmg\nCVE-2024-1246 | Concrete CMS up to 9.2.4 Image URL Import cross site scripting", "creation_timestamp": "2024-03-03T09:46:45.000000Z"}, {"uuid": "600ae11a-cca2-46ba-a925-90aca2fd6d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12462", "type": "seen", "source": "https://t.me/cvedetector/14450", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12462 - \"YOGO Booking for WordPress Stored XSS Exploit\"\", \n  \"Content\": \"CVE ID : CVE-2024-12462 \nPublished : Jan. 7, 2025, 5:15 a.m. | 40\u00a0minutes ago \nDescription : The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T07:10:09.000000Z"}, {"uuid": "976e86da-af65-49dd-af16-93d04fe9b2b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12468", "type": "seen", "source": "https://t.me/cvedetector/13573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12468 - WordPress Datepicker Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12468 \nPublished : Dec. 24, 2024, 9:15 a.m. | 37\u00a0minutes ago \nDescription : The WP Datepicker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpdp_get_selected_datepicker' parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T11:03:28.000000Z"}, {"uuid": "ad2ebb93-9757-4666-bccd-d9bd5e370ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12465", "type": "seen", "source": "https://t.me/cvedetector/12839", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12465 - Property Hive WordPress Stamp Duty Calculator Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12465 \nPublished : Dec. 13, 2024, 9:15 a.m. | 20\u00a0minutes ago \nDescription : The Property Hive Stamp Duty Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stamp_duty_calculator_scotland' shortcode in all versions up to, and including, 1.0.22 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T10:45:01.000000Z"}]}