{"vulnerability": "CVE-2024-4331", "sightings": [{"uuid": "f448a465-e8b9-4af7-be4c-b06e9ac9bf2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43315", "type": "seen", "source": "https://t.me/cvedetector/3484", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43315 - Stripe Payments For WooCommerce by Checkout Authorization Bypass Through User-Controlled Key Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43315 \nPublished : Aug. 18, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : Authorization Bypass Through User-Controlled Key vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T00:58:27.000000Z"}, {"uuid": "ed111858-1fe1-4734-bded-a860de30ec18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43317", "type": "seen", "source": "https://t.me/cvedetector/3561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43317 - Metagauss RegistrationMagic Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43317 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Metagauss User Registration Team RegistrationMagic allows Cross-Site Scripting (XSS).This issue affects RegistrationMagic: from n/a through 6.0.1.0. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:31.000000Z"}, {"uuid": "53367ada-8495-4f7f-a36b-6aa9ece5bf7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43311", "type": "seen", "source": "https://t.me/cvedetector/3559", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43311 - \"Geek Code Lab Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-43311 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Improper Privilege Management vulnerability in Geek Code Lab Login As Users allows Privilege Escalation.This issue affects Login As Users: from n/a through 1.4.2. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:29.000000Z"}, {"uuid": "fe03c46a-f1b2-4039-8e59-69934f992c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43313", "type": "seen", "source": "https://t.me/cvedetector/3463", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43313 - Apache FormFacade Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43313 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FormFacade allows Reflected XSS.This issue affects FormFacade: from n/a through 1.3.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:51.000000Z"}, {"uuid": "4d82d42d-a4a9-4eb2-93c6-bdd3abcf5c18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43318", "type": "seen", "source": "https://t.me/cvedetector/3461", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43318 - E2Pdf.com Stored Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43318 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:49.000000Z"}, {"uuid": "7fa5de68-be81-4b79-aad7-55000d9ba30d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43316", "type": "seen", "source": "https://t.me/cvedetector/4214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43316 - Stripe Payments For WooCommerce by Checkout CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43316 \nPublished : Aug. 26, 2024, 9:15 p.m. | 31\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T23:51:05.000000Z"}, {"uuid": "6961b32d-eba5-4c0b-9cac-2fe81cbcd57d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43319", "type": "seen", "source": "https://t.me/cvedetector/4184", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43319 - bPlugins LLC Flash &amp; HTML5 Video Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-43319 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in bPlugins LLC Flash &amp; HTML5 Video.This issue affects Flash &amp; HTML5 Video: from n/a through 2.5.31. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:50.000000Z"}]}