{"vulnerability": "CVE-2024-1103", "sightings": [{"uuid": "4669af69-937a-4a76-9216-fabd69051fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113509312850861765", "content": "", "creation_timestamp": "2024-11-19T11:11:01.969246Z"}, {"uuid": "184114fd-2922-41bc-ad7f-cf211ebe5926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11038", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113509312865411858", "content": "", "creation_timestamp": "2024-11-19T11:11:02.189363Z"}, {"uuid": "cb336ffe-f877-4c52-8d4d-bf34964c4df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11034", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113535239658678358", "content": "", "creation_timestamp": "2024-11-24T01:04:33.473259Z"}, {"uuid": "ff735e02-3628-4cae-aedc-734cbaa3ae90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11034", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113532027828976073", "content": "", "creation_timestamp": "2024-11-23T11:27:45.047929Z"}, {"uuid": "4ed12181-230a-4487-83de-a98547e5a801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11032", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113548571262816832", "content": "", "creation_timestamp": "2024-11-26T09:34:57.747001Z"}, {"uuid": "a75b14af-d362-44a8-98df-84e6d10b81b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11035", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6575", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11035\n\ud83d\udd25 CVSS Score: 2.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which s a type of issue whereby sensitive information may b exposed due to a vulnerability in software.\n\ud83d\udccf Published: 2025-03-05T16:56:53.153Z\n\ud83d\udccf Modified: 2025-03-05T17:10:17.214Z\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25472", "creation_timestamp": "2025-03-05T18:30:30.000000Z"}, {"uuid": "56d7e5b5-c0f3-403f-b5cc-27d2f7367cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11035", "type": "seen", "source": "https://t.me/cvedetector/19651", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11035 - Carbon Black Cloud Windows Sensor Information Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11035 \nPublished : March 5, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which s a type of issue whereby sensitive information may b exposed due to a vulnerability in software. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T21:07:32.000000Z"}, {"uuid": "c5696a0a-262e-4cf7-9226-02b1400ae7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11038", "type": "seen", "source": "https://t.me/cvedetector/11442", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11038 - WordPress WPB Popup for Contact Form 7 Shortcode Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11038 \nPublished : Nov. 19, 2024, 11:15 a.m. | 45\u00a0minutes ago \nDescription : The The WPB Popup for Contact Form 7 \u2013 Showing The Contact Form 7 Popup on Button Click \u2013 CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T13:27:55.000000Z"}, {"uuid": "1ed5a171-7424-4219-a9bd-87ea15281fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11036", "type": "seen", "source": "https://t.me/cvedetector/11443", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11036 - GamiPress - Shortcode Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11036 \nPublished : Nov. 19, 2024, 11:15 a.m. | 45\u00a0minutes ago \nDescription : The The GamiPress \u2013 The #1 gamification plugin to reward points, achievements, badges &amp; ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T13:27:56.000000Z"}, {"uuid": "e37bd739-62e5-4d9f-a292-591997fd7d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1103", "type": "seen", "source": "https://t.me/ctinow/190724", "content": "https://ift.tt/2JUEqYw\nCVE-2024-1103 | CodeAstro Real Estate Management System 1.0 Feedback Form profile.php Your Feedback cross site scripting", "creation_timestamp": "2024-02-22T13:42:23.000000Z"}, {"uuid": "48080e5f-cd1f-4819-9958-bf526936ed88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1103", "type": "seen", "source": "https://t.me/ctinow/179576", "content": "https://ift.tt/HQU19YE\nCVE-2024-1103 Exploit", "creation_timestamp": "2024-02-05T23:16:08.000000Z"}, {"uuid": "8ad5dd7a-ddf6-4c0d-9757-8faa93c7bd56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1103", "type": "seen", "source": "https://t.me/ctinow/176856", "content": "https://ift.tt/wI6odXx\nCVE-2024-1103", "creation_timestamp": "2024-01-31T16:21:57.000000Z"}]}