{"vulnerability": "cve-2024-5237", "sightings": [{"uuid": "5bd67678-c4b5-41af-b242-76314bbbbcc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52372", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482665281869686", "content": "", "creation_timestamp": "2024-11-14T18:14:12.287504Z"}, {"uuid": "c15480e6-27f8-41b3-b3c5-fc3cf2f1fff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52373", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482665296408614", "content": "", "creation_timestamp": "2024-11-14T18:14:12.613411Z"}, {"uuid": "c71e91b8-8193-451b-8495-5673d105321a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52375", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482665324801539", "content": "", "creation_timestamp": "2024-11-14T18:14:13.000569Z"}, {"uuid": "24b3d962-13e0-400f-82dd-e471ff7c8f38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52371", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482489245184935", "content": "", "creation_timestamp": "2024-11-14T17:29:26.240895Z"}, {"uuid": "074f26dc-037a-4c1c-ac54-eab0c6e6c360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52371", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482501321824816", "content": "", "creation_timestamp": "2024-11-14T17:32:30.426115Z"}, {"uuid": "be0c6748-52ed-4599-a025-d760f106db44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52374", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482665310275996", "content": "", "creation_timestamp": "2024-11-14T18:14:12.833285Z"}, {"uuid": "f65801f9-8b90-470a-a451-8f3cb1ec516a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52376", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482724325687045", "content": "", "creation_timestamp": "2024-11-14T18:29:13.218058Z"}, {"uuid": "bd2a4086-7771-467f-a5f0-6442018df4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52371", "type": "seen", "source": "https://t.me/cvedetector/10997", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52371 - DonnellC Global Gateway e4 Payeezy Gateway Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-52371 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DonnellC Global Gateway e4 | Payeezy Gateway.This issue affects Global Gateway e4 | Payeezy Gateway: from n/a through 2.0. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:51.000000Z"}, {"uuid": "9c2d888b-d2e1-42b3-b84b-0e217f305147", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52370", "type": "seen", "source": "https://t.me/cvedetector/11000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52370 - \"Hive Support WordPress Help Desk Unrestricted File Upload RCE\"\", \n  \"Content\": \"CVE ID : CVE-2024-52370 \nPublished : Nov. 14, 2024, 7:15 p.m. | 31\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Hive Support Hive Support \u2013 WordPress Help Desk allows Upload a Web Shell to a Web Server.This issue affects Hive Support \u2013 WordPress Help Desk: from n/a through 1.1.1. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:50:55.000000Z"}, {"uuid": "5ffbf470-5290-4665-aad1-2ace71bdcc89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52373", "type": "seen", "source": "https://t.me/cvedetector/10999", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52373 - Devexhub Gallery Unrestricted File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-52373 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Team Devexhub Devexhub Gallery allows Upload a Web Shell to a Web Server.This issue affects Devexhub Gallery: from n/a through 2.0.1. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:52.000000Z"}, {"uuid": "6259faae-a981-4f85-840a-31ed1bfa7bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52372", "type": "seen", "source": "https://t.me/cvedetector/10998", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52372 - WebTechGlobal Easy CSV Importer BETA File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-52372 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in WebTechGlobal Easy CSV Importer BETA allows Upload a Web Shell to a Web Server.This issue affects Easy CSV Importer BETA: from n/a through 7.0.0. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:52.000000Z"}, {"uuid": "563eee5e-4675-4976-b84c-92fd8143c643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52374", "type": "seen", "source": "https://t.me/cvedetector/10994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52374 - DoThatTask Unrestrictive WebShell Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52374 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in DoThatTask Do That Task allows Upload a Web Shell to a Web Server.This issue affects Do That Task: from n/a through 1.5.5. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:45.000000Z"}, {"uuid": "8d28c91c-17db-4e43-9aa4-8e177db0a5ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52376", "type": "seen", "source": "https://t.me/cvedetector/10993", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52376 - \"cmsMinds Boat Rental Plugin for WordPress RCE Upload\"\", \n  \"Content\": \"CVE ID : CVE-2024-52376 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in cmsMinds Boat Rental Plugin for WordPress allows Upload a Web Shell to a Web Server.This issue affects Boat Rental Plugin for WordPress: from n/a through 1.0.1. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:44.000000Z"}, {"uuid": "9cea2c62-bb1e-4583-aa05-b319212c929a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52375", "type": "seen", "source": "https://t.me/cvedetector/10992", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52375 - Arttia Creative Datasets Manager Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52375 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Arttia Creative Datasets Manager by Arttia Creative.This issue affects Datasets Manager by Arttia Creative: from n/a through 1.5. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:44.000000Z"}, {"uuid": "fd5fa632-1582-4129-ac86-13bc36eed230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52377", "type": "seen", "source": "https://t.me/cvedetector/10991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52377 - BdThemes Instant Image Generator Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52377 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in BdThemes Instant Image Generator allows Upload a Web Shell to a Web Server.This issue affects Instant Image Generator: from n/a through 1.5.4. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:43.000000Z"}, {"uuid": "4aae8b33-ed86-4985-8272-f55636f86ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52379", "type": "seen", "source": "https://t.me/cvedetector/10989", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52379 - KineticPay for WooCommerce Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52379 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Kinetic Innovative Technologies Sdn Bhd kineticPay for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects kineticPay for WooCommerce: from n/a through 2.0.8. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:38.000000Z"}, {"uuid": "1f9751a1-3748-4328-8089-d0b6a62f2d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52378", "type": "seen", "source": "https://t.me/cvedetector/10988", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52378 - Labs64 DigiPass Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52378 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Labs64 DigiPass allows Absolute Path Traversal.This issue affects DigiPass: from n/a through 0.3.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:37.000000Z"}, {"uuid": "ed882a46-fcbe-4fbf-bc0f-050e6162268d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52375", "type": "published-proof-of-concept", "source": "Telegram/_zXs4CwBWWYKi9CTn9sTG1jhUEbt5Q1mozsfDYC6ThsMTA4", "content": "", "creation_timestamp": "2025-03-22T10:00:06.000000Z"}, {"uuid": "18fed1a1-839e-4e94-bbff-d2d3fbccd13c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52375", "type": "published-proof-of-concept", "source": "Telegram/82a2CCv2PPefBAywwzeR-yS_ueYglGvjGZeFL5Nia0p4qd8", "content": "", "creation_timestamp": "2025-03-22T08:00:11.000000Z"}]}