{"vulnerability": "CVE-2024-3743", "sightings": [{"uuid": "acd6b557-6182-4749-bf08-a31f0b5cef00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37435", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2pdlh3f2i", "content": "", "creation_timestamp": "2025-01-02T12:18:58.362523Z"}, {"uuid": "f96b9c96-2a69-4114-8e4a-ad894db76017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37431", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2pb5t7q2c", "content": "", "creation_timestamp": "2025-01-02T12:18:55.378861Z"}, {"uuid": "aa156691-93a8-4587-b8ea-aaee1c26544b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37438", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerba5q55425", "content": "", "creation_timestamp": "2025-01-02T14:15:45.710452Z"}, {"uuid": "9acbc507-6b27-4ac2-8d53-ffe7e3ce13e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37438", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lercqkdyoj2k", "content": "", "creation_timestamp": "2025-01-02T14:42:48.759992Z"}, {"uuid": "128471cd-6182-4aaa-a5a7-0662f1c4291e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37431", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759859587962954", "content": "", "creation_timestamp": "2025-01-02T17:08:21.804081Z"}, {"uuid": "5476ac03-2ea3-49b5-949f-4aa2c4f3c0b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37435", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759859602137887", "content": "", "creation_timestamp": "2025-01-02T17:08:22.328571Z"}, {"uuid": "534f022d-58ae-4526-ac0e-a8295a90de85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37434", "type": "seen", "source": "https://t.me/cvedetector/1388", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37434 - Atarim Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-37434 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Atarim allows Stored XSS.This issue affects Atarim: from n/a through 3.31. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:24.000000Z"}, {"uuid": "5245149c-8330-4f34-80e6-6aa8fb996c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37432", "type": "seen", "source": "https://t.me/cvedetector/1391", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37432 - ThemeGrill Esteem Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37432 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeGrill Esteem allows Stored XSS.This issue affects Esteem: from n/a through 1.5.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:26.000000Z"}, {"uuid": "542f1239-6004-42ee-91e9-b4bd445b72dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37436", "type": "seen", "source": "https://t.me/cvedetector/1389", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37436 - Uncanny Owl Uncanny Toolkit Pro for LearnDash Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-37436 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Reflected XSS.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a before 4.1.4.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:25.000000Z"}, {"uuid": "65c02698-e992-40dd-aa81-066d2966c188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37433", "type": "seen", "source": "https://t.me/cvedetector/1390", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37433 - EverPress Mailster Improper Neutralization XSS\", \n  \"Content\": \"CVE ID : CVE-2024-37433 \nPublished : July 22, 2024, 9:15 a.m. | 33\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EverPress Mailster allows Reflected XSS.This issue affects Mailster: from n/a through 4.0.9. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T11:57:26.000000Z"}, {"uuid": "2c47d7c6-c506-4dc3-91aa-951185282442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37438", "type": "seen", "source": "https://t.me/cvedetector/14156", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37438 - Uncanny Owl Uncanny Toolkit Pro for LearnDash CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37438 \nPublished : Jan. 2, 2025, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Cross Site Request Forgery.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a before 4.1.4.1. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T15:55:50.000000Z"}, {"uuid": "4ad348f2-934a-4e98-ad0d-e0d23c6e6ba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37430", "type": "seen", "source": "https://t.me/cvedetector/316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37430 - Authentication Bypass by Spoofing vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2024-37430 \nPublished : July 9, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Authentication Bypass by Spoofing vulnerability in Patreon Patreon WordPress allows Functionality Misuse.This issue affects Patreon WordPress: from n/a through 1.9.0. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:56:00.000000Z"}, {"uuid": "4eb2b4c4-4c0a-40a0-a56e-3a5a52f5df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37437", "type": "seen", "source": "https://t.me/cvedetector/313", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37437 - Improper Limitation of a Pathname to a Restricted\", \n  \"Content\": \"CVE ID : CVE-2024-37437 \nPublished : July 9, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Elementor Elementor Website Builder allows Cross-Site Scripting (XSS), Stored XSS.This issue affects Elementor Website Builder: from n/a through 3.22.1. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:55:54.000000Z"}]}