{"vulnerability": "CVE-2024-2430", "sightings": [{"uuid": "ac20d110-af74-4fc7-b0fb-b12c49791e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24304", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17704", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24304\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the module \"Mailjet\" (mailjet) from Mailjet for PrestaShop before versions 3.5.1, a guest can download technical information without restriction.\n\ud83d\udccf Published: 2024-02-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-09T16:19:06.766Z\n\ud83d\udd17 References:\n1. https://github.com/mailjet/prestashop-mailjet-plugin-apiv3/releases/tag/v3.5.1\n2. https://security.friendsofpresta.org/modules/2024/02/06/mailjet.html", "creation_timestamp": "2025-06-09T16:56:05.000000Z"}, {"uuid": "aa94fbf9-81e5-4c81-8385-9989c8ea54bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24309", "type": "seen", "source": "https://t.me/ctinow/207353", "content": "https://ift.tt/geGxq9U\nCVE-2024-24309 | Ecomiz Survey TMA Module up to 2.0.0 on PrestaShop information disclosure", "creation_timestamp": "2024-03-14T01:46:37.000000Z"}, {"uuid": "e0eb4cae-d9cc-43ac-960e-b36236187594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2430", "type": "seen", "source": "https://t.me/cvedetector/710", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2430 - The Website Content in Page or Post WordPress plug\", \n  \"Content\": \"CVE ID : CVE-2024-2430 \nPublished : July 12, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Website Content in Page or Post WordPress plugin before 2024.04.09 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T09:23:19.000000Z"}, {"uuid": "6feee0a9-5550-4567-8bd2-6329539d00bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24304", "type": "seen", "source": "https://t.me/ctinow/197830", "content": "https://ift.tt/2ut8aDy\nCVE-2024-24304 | Mailjet Module up to 3.5.0 on PrestaShop information disclosure", "creation_timestamp": "2024-03-01T17:41:11.000000Z"}, {"uuid": "7908da11-c7ea-405a-a842-62d7b44fb2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24308", "type": "seen", "source": "https://t.me/ctinow/198445", "content": "https://ift.tt/ShOE0t8\nCVE-2024-24308 | Boostmyshop Module up to 1.1.9 on PrestaShop changeOrderCarrier.php sql injection", "creation_timestamp": "2024-03-02T18:51:56.000000Z"}, {"uuid": "f8e949a7-8f24-4d55-bdaf-5fafe536f8b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24307", "type": "seen", "source": "https://t.me/ctinow/198616", "content": "https://ift.tt/iBx1vCY\nCVE-2024-24307", "creation_timestamp": "2024-03-03T09:26:35.000000Z"}, {"uuid": "a6c95ab6-70d8-49fd-961d-3637aaf6cd19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24302", "type": "seen", "source": "https://t.me/ctinow/198653", "content": "https://ift.tt/vOXFG8T\nCVE-2024-24302", "creation_timestamp": "2024-03-03T10:26:21.000000Z"}, {"uuid": "35d27b26-8c0c-4bc3-9be6-1675e25cce55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24303", "type": "seen", "source": "https://t.me/ctinow/197860", "content": "https://ift.tt/BK05uaH\nCVE-2024-24303 | HiPresta Gift Wrapping Pro Module up to 1.4.0 on PrestaShop addGiftWrappingCartValue sql injection", "creation_timestamp": "2024-03-01T18:21:33.000000Z"}, {"uuid": "59d0be2f-18d0-4f48-a12a-dfaea0ce0073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24307", "type": "seen", "source": "https://t.me/ctinow/198620", "content": "https://ift.tt/iBx1vCY\nCVE-2024-24307", "creation_timestamp": "2024-03-03T09:26:39.000000Z"}, {"uuid": "54561d87-d330-48d8-885d-142c64b0c13f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24302", "type": "seen", "source": "https://t.me/ctinow/198657", "content": "https://ift.tt/vOXFG8T\nCVE-2024-24302", "creation_timestamp": "2024-03-03T10:31:03.000000Z"}, {"uuid": "edd62bbb-9af7-42b9-987e-01dee29d6c97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24309", "type": "seen", "source": "https://t.me/ctinow/192290", "content": "https://ift.tt/imn6jaU\nCVE-2024-24309", "creation_timestamp": "2024-02-23T23:26:24.000000Z"}, {"uuid": "dfafcb29-54a9-411b-900a-9e3730e31970", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24309", "type": "seen", "source": "https://t.me/ctinow/192302", "content": "https://ift.tt/imn6jaU\nCVE-2024-24309", "creation_timestamp": "2024-02-23T23:32:10.000000Z"}, {"uuid": "7d7a70e3-7a96-4ab0-b0db-7e77a05d6e16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24304", "type": "seen", "source": "https://t.me/ctinow/180609", "content": "https://ift.tt/yChvcez\nCVE-2024-24304", "creation_timestamp": "2024-02-07T10:26:34.000000Z"}, {"uuid": "c620f931-418c-40f9-b929-5f95975be889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24303", "type": "seen", "source": "https://t.me/ctinow/180608", "content": "https://ift.tt/ijt9VFJ\nCVE-2024-24303", "creation_timestamp": "2024-02-07T10:26:33.000000Z"}, {"uuid": "bee55c50-f979-46cc-beb1-a78f76cd33dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24301", "type": "seen", "source": "https://t.me/ctinow/185153", "content": "https://ift.tt/1ioQujP\nCVE-2024-24301", "creation_timestamp": "2024-02-15T00:31:54.000000Z"}, {"uuid": "956eb21c-9b55-44bf-9de1-6001e011c300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24300", "type": "seen", "source": "https://t.me/ctinow/185152", "content": "https://ift.tt/tzA2uJm\nCVE-2024-24300", "creation_timestamp": "2024-02-15T00:31:53.000000Z"}, {"uuid": "ed5f8bdb-763d-49fe-af67-4cf82db9ce23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24308", "type": "seen", "source": "https://t.me/ctinow/181905", "content": "https://ift.tt/npaeD4V\nCVE-2024-24308", "creation_timestamp": "2024-02-09T09:21:46.000000Z"}]}