{"vulnerability": "CVE-2024-3745", "sightings": [{"uuid": "c859429a-3129-4182-a94b-8bd429f38a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37452", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerbaa47yr2i", "content": "", "creation_timestamp": "2025-01-02T14:15:48.343791Z"}, {"uuid": "9f069e38-54f5-4baf-96d8-430a42ca13a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37450", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2pkvz7c2a", "content": "", "creation_timestamp": "2025-01-02T12:19:05.735394Z"}, {"uuid": "00fe7f04-bfff-4335-92d7-a3707ba1a0b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37458", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ppiwu32e", "content": "", "creation_timestamp": "2025-01-02T12:19:10.444540Z"}, {"uuid": "29096309-a02d-44ea-b681-6762233fe7a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37452", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lercql3why2g", "content": "", "creation_timestamp": "2025-01-02T14:42:51.703229Z"}, {"uuid": "a8fd7e3e-d808-4e50-8bb1-1604e54408ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37450", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759918634643891", "content": "", "creation_timestamp": "2025-01-02T17:23:22.674957Z"}, {"uuid": "ea4fc14d-d762-4d67-ba3d-7ed897ceac5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37451", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2pncp252i", "content": "", "creation_timestamp": "2025-01-02T12:19:08.144302Z"}, {"uuid": "1ec8ee7f-6aeb-4d70-80ec-a6fb48701115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37451", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759918648604937", "content": "", "creation_timestamp": "2025-01-02T17:23:23.021751Z"}, {"uuid": "d2df8cb2-3935-4683-9503-a11c69d4ca4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37458", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759918664106559", "content": "", "creation_timestamp": "2025-01-02T17:23:23.231642Z"}, {"uuid": "9be46da7-9a57-4630-899d-6f87e374a2f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37454", "type": "seen", "source": "https://t.me/cvedetector/314", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37454 - Improper Limitation of a Pathname to a Restricted\", \n  \"Content\": \"CVE ID : CVE-2024-37454 \nPublished : July 9, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AWSM Innovations AWSM Team allows Path Traversal.This issue affects AWSM Team: from n/a through 1.3.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:55:55.000000Z"}, {"uuid": "7fa3ff1d-d0c4-4bdb-85b8-37e38a649f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37452", "type": "seen", "source": "https://t.me/cvedetector/14147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37452 - MyThemeShop Schema Lite CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-37452 \nPublished : Jan. 2, 2025, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in MyThemeShop Schema Lite allows Cross Site Request Forgery.This issue affects Schema Lite: from n/a through 1.2.2. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T15:55:40.000000Z"}, {"uuid": "b8c5e6b0-bbd9-4fe8-a7d2-186d8454657c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37457", "type": "seen", "source": "https://t.me/cvedetector/1366", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37457 - Ultimate Blocks Gutenberg Blocks Plugin Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-37457 \nPublished : July 21, 2024, 11:15 p.m. | 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ultimate Blocks Ultimate Blocks \u2013 Gutenberg Blocks Plugin allows Stored XSS.This issue affects Ultimate Blocks \u2013 Gutenberg Blocks Plugin: from n/a through 3.1.9. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T01:55:18.000000Z"}, {"uuid": "1c077681-532b-4f27-9b3f-0f94b25de026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37459", "type": "seen", "source": "https://t.me/cvedetector/1361", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37459 - PayPlus Payment Gateway Reflected Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-37459 \nPublished : July 21, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PayPlus LTD PayPlus Payment Gateway allows Reflected XSS.This issue affects PayPlus Payment Gateway: from n/a through 6.6.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T01:05:05.000000Z"}, {"uuid": "407e6670-9bf0-4d47-bb03-714adee5818f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37455", "type": "seen", "source": "https://t.me/cvedetector/309", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37455 - Improper Privilege Management vulnerability in Bra\", \n  \"Content\": \"CVE ID : CVE-2024-37455 \nPublished : July 9, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Improper Privilege Management vulnerability in Brainstorm Force Ultimate Addons for Elementor allows Privilege Escalation.This issue affects Ultimate Addons for Elementor: from n/a through 1.36.31. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:55:48.000000Z"}]}