{"vulnerability": "CVE-2024-5157", "sightings": [{"uuid": "7abbf7d6-1893-4408-a9b4-a744a92832ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51579", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452202956343442", "content": "", "creation_timestamp": "2024-11-09T09:07:15.307607Z"}, {"uuid": "83541b7e-92f9-4b58-9d61-aeb3174d58f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51570", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452202940543353", "content": "", "creation_timestamp": "2024-11-09T09:07:15.393778Z"}, {"uuid": "4d77911a-0c25-43e5-8b67-7b67432e9e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51576", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113458463840485974", "content": "", "creation_timestamp": "2024-11-10T11:39:27.525526Z"}, {"uuid": "fe72f7a1-772b-4425-81ad-a16d82109acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51571", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462761869728712", "content": "", "creation_timestamp": "2024-11-11T05:52:30.343922Z"}, {"uuid": "7c3262d5-5020-4d08-8e7a-b1f45a8d0e2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51572", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462761884698426", "content": "", "creation_timestamp": "2024-11-11T05:52:30.739690Z"}, {"uuid": "b81d68ed-84ef-4f6e-ba80-2ada8b093e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51573", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462761901823177", "content": "", "creation_timestamp": "2024-11-11T05:52:31.042483Z"}, {"uuid": "c8cbfa26-022b-4fc1-a190-1d4c812c8000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51574", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462761916404250", "content": "", "creation_timestamp": "2024-11-11T05:52:31.184499Z"}, {"uuid": "af21d98d-6c6a-466f-8de8-161a3eb2ee48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51575", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462820918560715", "content": "", "creation_timestamp": "2024-11-11T06:07:31.382739Z"}, {"uuid": "47056b96-c115-443a-bbed-d94b132dc7b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51575", "type": "seen", "source": "https://t.me/cvedetector/10456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51575 - Elementor Abdullah Extender Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51575 \nPublished : Nov. 11, 2024, 6:15 a.m. | 24\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Abdullah Extender All In One For Elementor allows Stored XSS.This issue affects Extender All In One For Elementor: from n/a through 1.0.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:07.000000Z"}, {"uuid": "a78c89c0-0dc5-446e-8906-c19ae03d73e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51574", "type": "seen", "source": "https://t.me/cvedetector/10455", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51574 - Simple Goods Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51574 \nPublished : Nov. 11, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Simple Goods allows Stored XSS.This issue affects Simple Goods: from n/a through 0.1.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:03.000000Z"}, {"uuid": "0b9db8a1-fb86-48c4-963b-d8853b969211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51573", "type": "seen", "source": "https://t.me/cvedetector/10460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51573 - Matthew Lillistone ML Responsive Audio player XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51573 \nPublished : Nov. 11, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Matthew Lillistone ML Responsive Audio player with playlist Shortcode allows Stored XSS.This issue affects ML Responsive Audio player with playlist Shortcode: from n/a through 0.2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:09.000000Z"}, {"uuid": "fa76030a-506a-4012-8292-137a77f0a164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51572", "type": "seen", "source": "https://t.me/cvedetector/10459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51572 - Peter Shaw LH QR Codes Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51572 \nPublished : Nov. 11, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Peter Shaw LH QR Codes allows Stored XSS.This issue affects LH QR Codes: from n/a through 1.06. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:09.000000Z"}, {"uuid": "a187ffa8-57d8-41f1-9ce0-3f8ccd96195f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51571", "type": "seen", "source": "https://t.me/cvedetector/10458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51571 - MasterBip para Elementor DOM-Based XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51571 \nPublished : Nov. 11, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MasterBip MasterBip para Elementor allows DOM-Based XSS.This issue affects MasterBip para Elementor: from n/a through 1.6.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:08.000000Z"}, {"uuid": "680e44b8-25fb-42c6-bddb-a94ed6b3fbab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51576", "type": "seen", "source": "https://t.me/cvedetector/10425", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51576 - WordPress Zero Access Amplified Media Pulse Image Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-51576 \nPublished : Nov. 10, 2024, 12:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPZA AMP Img Shortcode allows Stored XSS.This issue affects AMP Img Shortcode: from n/a through 1.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T14:10:26.000000Z"}, {"uuid": "822070cc-92cd-43a5-80d3-909097326198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51577", "type": "seen", "source": "https://t.me/cvedetector/10423", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51577 - Camunda Services GmbH bpmn.Io Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51577 \nPublished : Nov. 10, 2024, 10:15 a.m. | 45\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Camunda Services GmbH bpmn.Io allows Stored XSS.This issue affects bpmn.Io: from n/a through 1.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T12:30:05.000000Z"}, {"uuid": "5b9c6c43-d879-4235-92ac-6c8cafa03101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51578", "type": "seen", "source": "https://t.me/cvedetector/10422", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51578 - Luca Paggetti 3D Presentation Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51578 \nPublished : Nov. 10, 2024, 10:15 a.m. | 45\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Luca Paggetti 3D Presentation allows Stored XSS.This issue affects 3D Presentation: from n/a through 1.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-10T12:30:04.000000Z"}, {"uuid": "77e89e0f-fa87-43d6-9755-eba24a288e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51570", "type": "seen", "source": "https://t.me/cvedetector/10300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51570 - Odihost Easy Gallery SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51570 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Odihost Easy Gallery allows SQL Injection.This issue affects Easy Gallery: from n/a through 1.4. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:57.000000Z"}, {"uuid": "bf7c635c-152d-47f5-918c-00da4a32c183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51579", "type": "seen", "source": "https://t.me/cvedetector/10301", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51579 - Saleswonder Biz SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51579 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder.Biz 5 Stars Rating Funnel allows SQL Injection.This issue affects 5 Stars Rating Funnel: from n/a through 1.4.01. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:58.000000Z"}]}