{"vulnerability": "CVE-2024-3711", "sightings": [{"uuid": "33833975-5b6a-4a57-9c84-f2fbe710600e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37113", "type": "seen", "source": "https://t.me/cvedetector/569", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37113 - Exposure of Sensitive Information to an Unauthoriz\", \n  \"Content\": \"CVE ID : CVE-2024-37113 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:54.000000Z"}, {"uuid": "973be4d5-7700-4dff-bead-e94aabb484c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37115", "type": "seen", "source": "https://t.me/cvedetector/568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37115 - Exposure of Sensitive Information to an Unauthoriz\", \n  \"Content\": \"CVE ID : CVE-2024-37115 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Automattic Newspack Blocks.This issue affects Newspack Blocks: from n/a through 3.0.8. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:50.000000Z"}, {"uuid": "3044c77b-d7cc-4c08-9215-9c48e907ea92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37110", "type": "seen", "source": "https://t.me/cvedetector/567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37110 - Exposure of Sensitive Information to an Unauthoriz\", \n  \"Content\": \"CVE ID : CVE-2024-37110 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:49.000000Z"}, {"uuid": "8d1f670d-bd5d-4844-9481-1c95eaef543a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37114", "type": "seen", "source": "https://t.me/cvedetector/1427", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37114 - \"Takashi Matsuyama My Favorites Stored XSS\"\", \n  \"Content\": \"CVE ID : CVE-2024-37114 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Takashi Matsuyama My Favorites allows Stored XSS.This issue affects My Favorites: from n/a through 1.4.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:27.000000Z"}, {"uuid": "cef08b23-aead-41af-93dc-02b040f7dc9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37117", "type": "seen", "source": "https://t.me/cvedetector/1424", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37117 - \"Cisco Uncanny Automator Pro XSS\"\", \n  \"Content\": \"CVE ID : CVE-2024-37117 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Uncanny Owl Uncanny Automator Pro allows Reflected XSS.This issue affects Uncanny Automator Pro: from n/a through 5.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:24.000000Z"}]}