{"vulnerability": "CVE-2024-13095", "sightings": [{"uuid": "17dc209c-4ce4-4a07-9e58-56c0d01ab470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13095", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgpc3opoio2w", "content": "", "creation_timestamp": "2025-01-27T06:16:12.546123Z"}, {"uuid": "3f9ecb7f-f32b-4a0c-8fac-7dc096f5abdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13095", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113898933833326773", "content": "", "creation_timestamp": "2025-01-27T06:36:46.310096Z"}, {"uuid": "ec9bcddb-e9f2-470b-9e45-3d641759159f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13095", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgpdxifkzn2e", "content": "", "creation_timestamp": "2025-01-27T06:49:40.129945Z"}, {"uuid": "c9df6ac3-09fa-4866-af1a-8a200666d68a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13095", "type": "seen", "source": "https://t.me/cvedetector/16437", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13095 - WordPress Triggers Lite SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-13095 \nPublished : Jan. 27, 2025, 6:15 a.m. | 2\u00a0hours, 12\u00a0minutes ago \nDescription : The WP Triggers Lite WordPress plugin through 2.5.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T10:08:17.000000Z"}, {"uuid": "a4e42527-e163-42a0-b360-838beb61f4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13095", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3170", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-7jq5-8rmw-j9wh\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Triggers Lite WordPress plugin through 2.5.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks\n\ud83d\udccf Published: 2025-01-27T06:30:26Z\n\ud83d\udccf Modified: 2025-01-27T06:30:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13095\n2. https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d", "creation_timestamp": "2025-01-27T07:08:01.000000Z"}]}