{"vulnerability": "CVE-2024-4480", "sightings": [{"uuid": "6453f1ae-6d29-4fa7-abba-f2bce9ff7a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44809", "type": "seen", "source": "https://t.me/cvedetector/4731", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44809 - Pi Camera RECANTHA Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44809 \nPublished : Sept. 3, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the \"position\" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T01:00:21.000000Z"}, {"uuid": "9a45c688-0d2e-4ebe-b31e-bfe3c869ac8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4480", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8745", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4480\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack\n\ud83d\udccf Published: 2024-06-14T06:00:04.871Z\n\ud83d\udccf Modified: 2025-03-25T18:38:44.803Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/", "creation_timestamp": "2025-03-25T19:25:01.000000Z"}, {"uuid": "9e03db51-88b0-4417-8cd2-1b19a696d3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44807", "type": "seen", "source": "https://t.me/cvedetector/7721", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44807 - D-ZERO CO., LTD BaserCMS Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44807 \nPublished : Oct. 11, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : A directory listing issue in the baserCMS plugin in D-ZERO CO., LTD. BurgerEditor and BurgerEditor Limited Edition before 2.25.1 allows remote attackers to obtain sensitive information by exposing a list of the uploaded files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T21:13:54.000000Z"}, {"uuid": "dbebad0e-579c-486a-8166-67ccbbc0f0c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44808", "type": "seen", "source": "https://t.me/cvedetector/4807", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44808 - Vypor Attack API System Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44808 \nPublished : Sept. 4, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : An issue in Vypor Attack API System v.1.0 allows a remote attacker to execute arbitrary code via the user GET parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T19:25:25.000000Z"}]}