{"vulnerability": "cve-2024-5376", "sightings": [{"uuid": "4c1dad79-63df-42d9-800e-bf88ed31344f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53767", "type": "seen", "source": "https://t.me/cvedetector/11709", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53767 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2024-53767 \nPublished : Nov. 30, 2024, 10:15 p.m. | 9\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixobe Pixobe Cartography allows DOM-Based XSS.This issue affects Pixobe Cartography: from n/a through 1.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:09.000000Z"}, {"uuid": "9f0e3c09-44ae-4363-9665-85d10b90b92d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53766", "type": "seen", "source": "https://t.me/cvedetector/11708", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53766 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2024-53766 \nPublished : Nov. 30, 2024, 10:15 p.m. | 9\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Devnex Devnex Addons For Elementor allows DOM-Based XSS.This issue affects Devnex Addons For Elementor: from n/a through 1.0.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:08.000000Z"}, {"uuid": "47cc336d-49aa-476d-9b01-079002bce53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53764", "type": "seen", "source": "https://t.me/cvedetector/11707", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53764 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2024-53764 \nPublished : Nov. 30, 2024, 10:15 p.m. | 9\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoftHopper Softtemplates For Elementor allows DOM-Based XSS.This issue affects Softtemplates For Elementor: from n/a through 1.0.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:07.000000Z"}, {"uuid": "8698bc0b-5046-4238-8e7e-988220afcca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53763", "type": "seen", "source": "https://t.me/cvedetector/11706", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53763 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2024-53763 \nPublished : Nov. 30, 2024, 10:15 p.m. | 9\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rejuan Ahamed Best Addons for Elementor allows Stored XSS.This issue affects Best Addons for Elementor: from n/a through 1.0.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:07.000000Z"}, {"uuid": "f5201275-2048-48c2-a3c6-341083559d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53760", "type": "seen", "source": "https://t.me/cvedetector/11705", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53760 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2024-53760 \nPublished : Nov. 30, 2024, 10:15 p.m. | 9\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Capitalize My Title allows Stored XSS.This issue affects Capitalize My Title: from n/a through 0.5.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:03.000000Z"}, {"uuid": "ecfd454a-f4d8-45b8-9c59-2f41ea096cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53761", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113584792878394650", "content": "", "creation_timestamp": "2024-12-02T19:06:35.799634Z"}, {"uuid": "766b3b2b-4d73-4af6-81f9-fb1282677c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53762", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113584792892394606", "content": "", "creation_timestamp": "2024-12-02T19:06:36.560959Z"}, {"uuid": "274cc41a-df65-4d5a-a176-c99bf006dbcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53769", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113584851908846889", "content": "", "creation_timestamp": "2024-12-02T19:21:36.540730Z"}, {"uuid": "935e3855-1f4f-43a7-a6fc-9e62201f3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53765", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113584792906048840", "content": "", "creation_timestamp": "2024-12-02T19:06:36.928297Z"}, {"uuid": "732d969a-5895-4c69-890c-d0567f6f72fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53768", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113573928774222005", "content": "", "creation_timestamp": "2024-11-30T21:03:42.748247Z"}, {"uuid": "855d5b8e-d3dd-4754-b0d7-6635f8934198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53760", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113574134106107134", "content": "", "creation_timestamp": "2024-11-30T21:55:56.936433Z"}, {"uuid": "fa7f5e47-bca7-4d99-9420-daa07ef1e32e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53763", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113574134128715187", "content": "", "creation_timestamp": "2024-11-30T21:55:57.179751Z"}, {"uuid": "f9756487-632a-4f12-8085-798f5ad6c564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53768", "type": "seen", "source": "https://t.me/cvedetector/11719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53768 - Exposure of Sensitive System Information to an Una\", \n  \"Content\": \"CVE ID : CVE-2024-53768 \nPublished : Nov. 30, 2024, 9:15 p.m. | 10\u00a0hours, 58\u00a0minutes ago \nDescription : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in IDE Interactive Content Audit Exporter allows Retrieve Embedded Sensitive Data.This issue affects Content Audit Exporter: from n/a through 1.1. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-01T09:18:22.000000Z"}, {"uuid": "5b92c4f8-898b-4b20-a321-d8b8bed7ffe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53762", "type": "seen", "source": "https://t.me/cvedetector/11782", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53762 - Faster Themes FastBook Stored XSS CSRF vulnerabability\", \n  \"Content\": \"CVE ID : CVE-2024-53762 \nPublished : Dec. 2, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Faster Themes FastBook \u2013 Responsive Appointment Booking and Scheduling System allows Stored XSS.This issue affects FastBook \u2013 Responsive Appointment Booking and Scheduling System: from n/a through 1.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T16:14:55.000000Z"}, {"uuid": "7c1dc2aa-d475-4b9f-b02b-a302ab2bb440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53761", "type": "seen", "source": "https://t.me/cvedetector/11781", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53761 - WP Revisions Manager CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53761 \nPublished : Dec. 2, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in P. Roy WP Revisions Manager allows Cross Site Request Forgery.This issue affects WP Revisions Manager: from n/a through 1.0.2. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T16:14:54.000000Z"}, {"uuid": "f11933ec-9f1d-445a-b883-702066a09ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53769", "type": "seen", "source": "https://t.me/cvedetector/11785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53769 - Ludovic RIAUDEL Custom Post Type to Map Store CSRF Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-53769 \nPublished : Dec. 2, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Ludovic RIAUDEL Custom Post Type to Map Store allows Stored XSS.This issue affects Custom Post Type to Map Store: from n/a through 1.1.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T16:14:58.000000Z"}, {"uuid": "5fa22429-98a5-4daa-bcfd-660b6e2d3798", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53765", "type": "seen", "source": "https://t.me/cvedetector/11783", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53765 - Think201 Mins To Read CSRF Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53765 \nPublished : Dec. 2, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Think201 Mins To Read allows Stored XSS.This issue affects Mins To Read: from n/a through 1.2.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T16:14:56.000000Z"}]}