{"vulnerability": "cve-2024-5239", "sightings": [{"uuid": "0c10be33-2cb0-414f-b891-934d6d90fcff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52391", "type": "seen", "source": "https://t.me/cvedetector/12399", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52391 - Genetech Pie Register Premium Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52391 \nPublished : Dec. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Genetech Pie Register Premium.This issue affects Pie Register Premium: from n/a before 3.8.3.3. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T16:22:24.000000Z"}, {"uuid": "82609f7b-41b8-4441-82e6-0da409df4c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52393", "type": "seen", "source": "https://t.me/cvedetector/10980", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52393 - Podlove Podlove Podcast Publisher Template Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52393 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.15. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:29.000000Z"}, {"uuid": "4eb5c1dd-4a5a-4d88-8527-1bcfee94e779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-52393", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3minvsd5k6q2a", "content": "", "creation_timestamp": "2026-04-04T09:20:09.424476Z"}, {"uuid": "7cfa477a-032d-46ea-a0a2-8a0ee21fd66b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52395", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113513489591676026", "content": "", "creation_timestamp": "2024-11-20T04:53:14.341523Z"}, {"uuid": "5e28277a-8112-4ed9-a41f-27777a8929ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52393", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482560362678936", "content": "", "creation_timestamp": "2024-11-14T17:47:31.431414Z"}, {"uuid": "01b3feb8-2e01-48ca-89f2-1c559e627915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52396", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113482560377170664", "content": "", "creation_timestamp": "2024-11-14T17:47:31.565929Z"}, {"uuid": "e37cdc2a-25e8-4160-84ee-07a4187683db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52394", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113506077071674165", "content": "", "creation_timestamp": "2024-11-18T21:28:08.138806Z"}, {"uuid": "af33a4ae-be41-40e8-a85f-2eb9646f5686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52398", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113494916662565912", "content": "", "creation_timestamp": "2024-11-16T22:09:53.835239Z"}, {"uuid": "5fa709d5-ba89-4321-9afa-53a59d183642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52399", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113494916677258921", "content": "", "creation_timestamp": "2024-11-16T22:09:53.909149Z"}, {"uuid": "4fb76cc1-f82b-41a8-8285-b2ffdc26acb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52397", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113494960147887027", "content": "", "creation_timestamp": "2024-11-16T22:20:57.099071Z"}, {"uuid": "0e66acf7-2bb6-4ea4-a2fd-4073a0aa091c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52394", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "c3db2ba5-2d24-4225-bb0c-55bb21ffe79a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52392", "type": "seen", "source": "https://t.me/cvedetector/11534", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52392 - W3SPEEDSTER CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52392 \nPublished : Nov. 19, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER.This issue affects W3SPEEDSTER: from n/a through 7.25. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T00:21:55.000000Z"}, {"uuid": "2e405ce1-0066-4cac-86d4-18113b5d36a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52395", "type": "seen", "source": "https://t.me/cvedetector/11466", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52395 - QuantumCloud Floating Buttons for WooCommerce Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52395 \nPublished : Nov. 19, 2024, 5:15 p.m. | 37\u00a0minutes ago \nDescription : Missing Authorization vulnerability in QunatumCloud Floating Buttons for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Floating Buttons for WooCommerce: from n/a through 2.8.8. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T19:19:11.000000Z"}, {"uuid": "44b50cd9-f343-4fd5-a4b3-5ecc646e3b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52399", "type": "seen", "source": "https://t.me/cvedetector/11248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52399 - Clarisse K. Writer Helper Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52399 \nPublished : Nov. 16, 2024, 10:15 p.m. | 43\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Clarisse K. Writer Helper allows Upload a Web Shell to a Web Server.This issue affects Writer Helper: from n/a through 3.1.6. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-17T00:25:29.000000Z"}, {"uuid": "b7a2a55a-9ac1-4a8a-9542-a473d36a6da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52394", "type": "seen", "source": "https://t.me/cvedetector/11395", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52394 - Nopea.Media Print PDF Generator and Publisher Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-52394 \nPublished : Nov. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in nopea.Media Print PDF Generator and Publisher allows Stored XSS.This issue affects Print PDF Generator and Publisher: from n/a through 1.1.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T00:04:50.000000Z"}, {"uuid": "046333dc-3eb3-40cb-9a6a-d544bdf8a980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52390", "type": "seen", "source": "https://t.me/cvedetector/11394", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52390 - CYAN Backup Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52390 \nPublished : Nov. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : : Path Traversal: '.../...//' vulnerability in CYAN Backup allows Path Traversal.This issue affects CYAN Backup: from n/a through 2.5.3. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T00:04:46.000000Z"}, {"uuid": "ca063e6c-399b-47db-970d-a916ef28f1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52398", "type": "seen", "source": "https://t.me/cvedetector/11247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52398 - Halyra CDI Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52398 \nPublished : Nov. 16, 2024, 10:15 p.m. | 43\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Halyra CDI.This issue affects CDI: from n/a through 5.5.3. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-17T00:25:29.000000Z"}, {"uuid": "5960e0d1-e786-46a2-bdca-62f3a8a61180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52397", "type": "seen", "source": "https://t.me/cvedetector/11250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52397 - Davor Zeljkovic Convert Docx2post Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52397 \nPublished : Nov. 16, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Davor Zeljkovic Convert Docx2post allows Upload a Web Shell to a Web Server.This issue affects Convert Docx2post: from n/a through 1.4. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-17T01:15:40.000000Z"}, {"uuid": "f6311d44-5e11-4d29-9931-f82875564a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52396", "type": "seen", "source": "https://t.me/cvedetector/10982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52396 - Realmag777 WOLF Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52396 \nPublished : Nov. 14, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal.This issue affects WOLF: from n/a through 1.0.8.3. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T20:00:31.000000Z"}]}