{"vulnerability": "CVE-2024-5160", "sightings": [{"uuid": "80542207-de7b-4bf0-a845-491b24d545b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51601", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452202970114021", "content": "", "creation_timestamp": "2024-11-09T09:07:15.456554Z"}, {"uuid": "6eb4c7fa-d4c2-449b-aa4a-d5c1395bf7b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51602", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452202985019840", "content": "", "creation_timestamp": "2024-11-09T09:07:15.426957Z"}, {"uuid": "e846f929-2680-4e5d-80ff-2b5bcc640a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51607", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452261985025127", "content": "", "creation_timestamp": "2024-11-09T09:22:14.834838Z"}, {"uuid": "d728ac31-fce4-4921-b0bd-ddbf599f8a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51603", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453480890896239", "content": "", "creation_timestamp": "2024-11-09T14:32:13.738892Z"}, {"uuid": "865bb02c-9f07-4a6a-b333-faa059c12a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51606", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miiuuitzpm2v", "content": "", "creation_timestamp": "2026-04-02T09:20:09.631716Z"}, {"uuid": "f5c6d610-4aa9-4526-96ec-6450456f3c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51608", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miivyavgjb2i", "content": "", "creation_timestamp": "2026-04-02T09:40:09.492924Z"}, {"uuid": "1eeffbae-2642-407f-b771-d1c3a36928b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51608", "type": "seen", "source": "https://t.me/cvedetector/10393", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51608 - Pluginhandy AmaDiscount SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51608 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pluginhandy AmaDiscount allows SQL Injection.This issue affects AmaDiscount: from n/a through 1.0. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:25.000000Z"}, {"uuid": "fe7712b7-d264-4ee5-9f93-126c020ae40e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51604", "type": "seen", "source": "https://t.me/cvedetector/10398", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51604 - Carlo Andro Mabugay Media Modal DOM-Based Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51604 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Carlo Andro Mabugay Media Modal allows DOM-Based XSS.This issue affects Media Modal: from n/a through 1.0.2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:32.000000Z"}, {"uuid": "5c1d09af-153b-484e-9497-93088ac927c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51603", "type": "seen", "source": "https://t.me/cvedetector/10397", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51603 - Strava NMR XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51603 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mircea N. NMR Strava activities allows DOM-Based XSS.This issue affects NMR Strava activities: from n/a through 1.0.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:31.000000Z"}, {"uuid": "e5950a54-7a98-4c40-98ad-83a052581c49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51601", "type": "seen", "source": "https://t.me/cvedetector/10299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51601 - Maksym Marko Website SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51601 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Maksym Marko Website price calculator allows SQL Injection.This issue affects Website price calculator: from n/a through 4.1. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:56.000000Z"}, {"uuid": "5687b5aa-64a6-4d63-8144-fd040e855db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51606", "type": "seen", "source": "https://t.me/cvedetector/10392", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51606 - Blrt Blrt WP Embed SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51606 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Blrt Blrt WP Embed allows SQL Injection.This issue affects Blrt WP Embed: from n/a through 1.6.9. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:25.000000Z"}, {"uuid": "3211d56d-729e-4932-ac5b-9755f3a97a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51605", "type": "seen", "source": "https://t.me/cvedetector/10391", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51605 - Genoo LLC XSS Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-51605 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Genoo, LLC Genoo allows DOM-Based XSS.This issue affects Genoo: from n/a through 6.0.10. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:24.000000Z"}, {"uuid": "1742fbe9-e33c-4b46-a661-5d9721d362d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51609", "type": "seen", "source": "https://t.me/cvedetector/10390", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51609 - Elsner Technologies Pvt. Ltd. Emoji Shortcode Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51609 \nPublished : Nov. 9, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elsner Technologies Pvt. Ltd. Emoji Shortcode allows Stored XSS.This issue affects Emoji Shortcode: from n/a through 1.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T17:16:23.000000Z"}, {"uuid": "3088c410-0068-48fd-a7d0-99825d079569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51607", "type": "seen", "source": "https://t.me/cvedetector/10297", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51607 - Buddy Lindsey Golf Tracker SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51607 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Buddy Lindsey Golf Tracker allows SQL Injection.This issue affects Golf Tracker: from n/a through 0.7. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:54.000000Z"}, {"uuid": "df5ab37f-513a-4151-bff5-7d29766c671a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51602", "type": "seen", "source": "https://t.me/cvedetector/10296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51602 - Simple Job Manager SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51602 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oleksandr Ustymenko Simple Job Manager allows SQL Injection.This issue affects Simple Job Manager: from n/a through 1.1. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:50.000000Z"}]}