{"vulnerability": "CVE-2024-2181", "sightings": [{"uuid": "2d2b4b74-5b5b-4663-b328-2897db26fe90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21815", "type": "seen", "source": "Telegram/fxAV2mB1cumao0oOvbvZSf_3w4-BXewujq6Z32bhsOJVkGTD", "content": "", "creation_timestamp": "2025-02-14T10:01:37.000000Z"}, {"uuid": "b7dc85f6-9ad3-44c6-93ac-3bb2f4cbddeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2181", "type": "seen", "source": "https://t.me/arpsyndicate/4480", "content": "#ExploitObserverAlert\n\nCVE-2024-2181\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2181. The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T08:29:08.000000Z"}, {"uuid": "4c4fd218-5a53-4c49-8aea-b0688dce389f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21812", "type": "seen", "source": "https://t.me/arpsyndicate/3808", "content": "#ExploitObserverAlert\n\nCVE-2024-21812\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-21812. An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-02-21T14:29:50.000000Z"}, {"uuid": "eae86000-d130-45d8-937c-8d16b7624937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21816", "type": "seen", "source": "https://t.me/ctinow/199076", "content": "https://ift.tt/GHf32ou\nCVE-2024-21816", "creation_timestamp": "2024-03-04T08:31:22.000000Z"}, {"uuid": "eeffbc3d-550f-4663-9328-59c92c93742c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21816", "type": "seen", "source": "https://t.me/ctinow/199068", "content": "https://ift.tt/GHf32ou\nCVE-2024-21816", "creation_timestamp": "2024-03-04T08:26:50.000000Z"}, {"uuid": "6353405e-9ce5-48b9-b3a5-f7ec7f8e93d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21815", "type": "seen", "source": "https://t.me/ctinow/199887", "content": "https://ift.tt/gn5I9rd\nCVE-2024-21815", "creation_timestamp": "2024-03-05T04:32:18.000000Z"}, {"uuid": "c94b3d6b-10f3-45ac-89c2-9e33dbbd05e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21815", "type": "seen", "source": "https://t.me/ctinow/199882", "content": "https://ift.tt/gn5I9rd\nCVE-2024-21815", "creation_timestamp": "2024-03-05T04:27:27.000000Z"}, {"uuid": "be81cdcc-099e-43d3-9107-63d6ffc3b370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21812", "type": "seen", "source": "https://t.me/ctinow/188758", "content": "https://ift.tt/67wPVp1\nCVE-2024-21812", "creation_timestamp": "2024-02-20T17:25:45.000000Z"}]}