{"vulnerability": "CVE-2024-11175", "sightings": [{"uuid": "3ffac5b0-029b-48f2-9acc-85cc6417e65f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11175", "type": "seen", "source": "https://t.me/cvedetector/10845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11175 - Public CMS Voting Management Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-11175 \nPublished : Nov. 13, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability was found in Public CMS 5.202406.d and classified as problematic. This issue affects some unknown processing of the file /admin/cmsVote/save of the component Voting Management. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named b9530b9cc1f5cfdad4b637874f59029a6283a65c. It is recommended to apply a patch to fix this issue. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T18:04:12.000000Z"}]}