{"vulnerability": "CVE-2024-12311", "sightings": [{"uuid": "7afc4467-0629-4ace-b457-9378710d184f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12311", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113779894293721804", "content": "", "creation_timestamp": "2025-01-06T06:03:31.376886Z"}, {"uuid": "0b7da31a-4715-4d34-86cf-c526c953d49e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12311", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2ibaes2f2l", "content": "", "creation_timestamp": "2025-01-06T06:15:34.951162Z"}, {"uuid": "bb7c4a91-0477-4846-9b5a-3e2314d0a853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12311", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf2k2xp2kp2e", "content": "", "creation_timestamp": "2025-01-06T06:47:53.034692Z"}, {"uuid": "4c672b40-fdaa-4ab2-a3cd-225a7925c3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12311", "type": "seen", "source": "https://t.me/cvedetector/14338", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12311 - Icegram Express WordPress Plugin SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12311 \nPublished : Jan. 6, 2025, 6:15 a.m. | 24\u00a0minutes ago \nDescription : The Email Subscribers by Icegram Express  WordPress plugin before 5.7.44 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T07:43:47.000000Z"}, {"uuid": "601f26bb-128d-46ef-84bb-19c71b6591f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12311", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/149", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-c797-jx9v-f674\n\ud83d\udd17 Aliases: CVE-2024-12311\n\ud83d\udd39 Details: The Email Subscribers by Icegram Express  WordPress plugin before 5.7.44 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T06:30:46Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T06:30:45Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12311\n2. https://wpscan.com/vulnerability/5e00ba3-daf-403-a0b9-6523696fbdd", "creation_timestamp": "2025-01-06T06:40:11.000000Z"}]}