{"vulnerability": "CVE-2024-3749", "sightings": [{"uuid": "56c2f0c1-ca57-4632-a87b-32a8b18ee905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37490", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2q365ad2e", "content": "", "creation_timestamp": "2025-01-02T12:19:22.751371Z"}, {"uuid": "30b0c8f2-d1a0-4bc3-8c5a-0f3a3520cfe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37491", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2q5gdp32i", "content": "", "creation_timestamp": "2025-01-02T12:19:25.113961Z"}, {"uuid": "f9f84fe5-b8c1-492f-92ce-fa1b6058070a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37493", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2q7tbp32e", "content": "", "creation_timestamp": "2025-01-02T12:19:27.725802Z"}, {"uuid": "a82f7ed1-54b0-45b8-9338-eee78377aa85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37490", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759977723218951", "content": "", "creation_timestamp": "2025-01-02T17:38:24.363611Z"}, {"uuid": "9fb685c8-b169-46bb-9f9a-537105046aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37491", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760036741219452", "content": "", "creation_timestamp": "2025-01-02T17:53:24.837241Z"}, {"uuid": "f56c9467-18b2-46b2-a8d3-9de8c73ce5de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37493", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760036755265356", "content": "", "creation_timestamp": "2025-01-02T17:53:25.309796Z"}, {"uuid": "5306013a-a17d-42fe-b186-65cd75b6ec97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37498", "type": "seen", "source": "https://t.me/cvedetector/566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37498 - Exposure of Sensitive Information to an Unauthoriz\", \n  \"Content\": \"CVE ID : CVE-2024-37498 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pauple Table &amp; Contact Form 7 Database \u2013 Tablesome.This issue affects Table &amp; Contact Form 7 Database \u2013 Tablesome: from n/a through 1.0.33. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:48.000000Z"}, {"uuid": "b35be134-98e0-49c5-8027-7ebbadd29ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37495", "type": "seen", "source": "https://t.me/cvedetector/1331", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37495 - Mediavine Create Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37495 \nPublished : July 21, 2024, 8:15 a.m. | 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mediavine Create by Mediavine allows Stored XSS.This issue affects Create by Mediavine: from n/a through 1.9.7. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-21T10:52:16.000000Z"}, {"uuid": "f9e71c21-ca5c-4071-a5d5-5a16adad1b8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37492", "type": "seen", "source": "https://t.me/cvedetector/1332", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37492 - Gutenberg Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37492 \nPublished : July 21, 2024, 8:15 a.m. | 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gutenberg Team Gutenberg allows Stored XSS.This issue affects Gutenberg: from n/a through 18.6.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-21T10:52:20.000000Z"}]}