{"vulnerability": "CVE-2024-3722", "sightings": [{"uuid": "52ec7b02-9fa8-4467-9b8d-fea2ce545950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37229", "type": "seen", "source": "https://t.me/cvedetector/1411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37229 - AuburnForest Blogmentor XSS Stored\", \n  \"Content\": \"CVE ID : CVE-2024-37229 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AuburnForest Blogmentor \u2013 Blog Layouts for Elementor allows Stored XSS.This issue affects Blogmentor \u2013 Blog Layouts for Elementor: from n/a through 1.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:03.000000Z"}, {"uuid": "92b41d56-c688-43c0-9ebe-363d4305504d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37224", "type": "seen", "source": "https://t.me/cvedetector/301", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37224 - Improper Limitation of a Pathname to a Restricted\", \n  \"Content\": \"CVE ID : CVE-2024-37224 \nPublished : July 9, 2024, 10:15 a.m. | 47\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Smartypants SP Project &amp; Document Manager allows Path Traversal.This issue affects SP Project &amp; Document Manager: from n/a through 4.71. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:05:27.000000Z"}, {"uuid": "597aae09-9a15-475c-a86c-11fc353f3af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37223", "type": "seen", "source": "https://t.me/cvedetector/1416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37223 - Nicdark Restaurant Reservations Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-37223 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nicdark Restaurant Reservations allows Stored XSS.This issue affects Restaurant Reservations: from n/a through 2.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:10.000000Z"}, {"uuid": "6852f40d-d4f7-435a-93a6-47657caf3257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37221", "type": "seen", "source": "https://t.me/cvedetector/1414", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37221 - Kimili Flash Embed Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-37221 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Bester Kimili Flash Embed allows Stored XSS.This issue affects Kimili Flash Embed: from n/a through 2.5.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:08.000000Z"}]}