{"vulnerability": "CVE-2024-5178", "sightings": [{"uuid": "91ae8714-06b5-4480-bbd5-b0f3e3fe7f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51787", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452129722050722", "content": "", "creation_timestamp": "2024-11-09T08:48:36.710418Z"}, {"uuid": "a9df4d98-490b-4cd8-bc57-93712bd7c35e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51785", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452027749592242", "content": "", "creation_timestamp": "2024-11-09T08:22:41.417837Z"}, {"uuid": "777a0015-5c72-4fe4-a139-00f9f0902710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51782", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452070674809786", "content": "", "creation_timestamp": "2024-11-09T08:33:35.691750Z"}, {"uuid": "aedf9838-a3c7-42c0-a464-cb3d05633ba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51784", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452070705310555", "content": "", "creation_timestamp": "2024-11-09T08:33:36.087009Z"}, {"uuid": "3ae410d6-276b-43e8-9fb9-f77750e0cef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51786", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452070719326136", "content": "", "creation_timestamp": "2024-11-09T08:33:36.401403Z"}, {"uuid": "f8b34373-8233-4af3-a897-5b3441dc1bf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452070691667913", "content": "", "creation_timestamp": "2024-11-09T08:33:35.901902Z"}, {"uuid": "c9f8db20-dea8-4eef-8d5a-1c57c4a6cb97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51780", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452342614369625", "content": "", "creation_timestamp": "2024-11-09T09:42:45.247760Z"}, {"uuid": "2d36c2bc-6686-47d9-a131-d46f6001e677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51781", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452342628610243", "content": "", "creation_timestamp": "2024-11-09T09:42:45.405971Z"}, {"uuid": "ed4ae4a7-1792-45ab-9d7d-7b89e07fbc25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51788", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113462838460852035", "content": "", "creation_timestamp": "2024-11-11T06:11:58.915505Z"}, {"uuid": "ad7f5734-9ed3-4fb1-9cbd-18e325fd176b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/infrasecalliance.org/post/3lkthvqwsjc26", "content": "", "creation_timestamp": "2025-03-20T19:51:43.880463Z"}, {"uuid": "4817d553-a0e6-46d4-bb1b-6f63c4cc6589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkxcdrog3v2p", "content": "", "creation_timestamp": "2025-03-22T08:22:48.684731Z"}, {"uuid": "05ef50bd-0428-4dad-b1d0-5944fabc9ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lky6uwrfa22x", "content": "", "creation_timestamp": "2025-03-22T16:53:28.974467Z"}, {"uuid": "d6ac9edb-0c59-450b-b938-0e6848d80ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lkvkvumgpr2k", "content": "", "creation_timestamp": "2025-03-21T15:50:46.612267Z"}, {"uuid": "623968af-6b61-4376-a4e4-59c0cac6e9d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/infrasecalliance.org/post/3lkthvqwtik26", "content": "", "creation_timestamp": "2025-03-20T19:51:44.610236Z"}, {"uuid": "663e9442-b2e8-4f94-aeda-ee80f6fd05c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/infrasecalliance.org/post/3lkthvqwtil26", "content": "", "creation_timestamp": "2025-03-20T19:51:45.322676Z"}, {"uuid": "84275bd8-4922-471a-84ff-49b499e7360f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/infrasecalliance.org/post/3lkthvqwuht26", "content": "", "creation_timestamp": "2025-03-20T19:51:46.006212Z"}, {"uuid": "557618c6-6b54-4dd4-b0fc-50acce1bf9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://bsky.app/profile/infrasecalliance.org/post/3lkthvqwomc26", "content": "", "creation_timestamp": "2025-03-20T19:51:43.206833Z"}, {"uuid": "055ca8fd-0c60-4fd9-bc45-d4a09b7f7990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/0ed650b2-0845-4a5d-8164-a858acafffa8", "content": "", "creation_timestamp": "2024-07-27T20:58:34.478877Z"}, {"uuid": "ca5fd5aa-952f-4fab-885a-9c2b404e32bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51789", "type": "seen", "source": "https://t.me/cvedetector/10453", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51789 - \"UjW0L Image Classify File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-51789 \nPublished : Nov. 11, 2024, 6:15 a.m. | 24\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in UjW0L Image Classify allows Upload a Web Shell to a Web Server.This issue affects Image Classify: from n/a through 1.0.0. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:02.000000Z"}, {"uuid": "1fa91360-6d6b-40a4-89d4-e38d826717dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51788", "type": "seen", "source": "https://t.me/cvedetector/10457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51788 - The Novel Design Store Directory Unrestricted File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-51788 \nPublished : Nov. 11, 2024, 6:15 a.m. | 24\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Joshua Wolfe The Novel Design Store Directory allows Upload a Web Shell to a Web Server.This issue affects The Novel Design Store Directory: from n/a through 4.3.0. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:07.000000Z"}, {"uuid": "737f339c-2db8-4ea6-9f83-bf855f2783d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51785", "type": "seen", "source": "https://t.me/cvedetector/10290", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51785 - I Thirteen Web Solution Responsive Filterable Portfolio SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51785 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) vulnerability in I Thirteen Web Solution Responsive Filterable Portfolio allows Server Side Request Forgery.This issue affects Responsive Filterable Portfolio: from n/a through 1.0.22. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:42.000000Z"}, {"uuid": "2821994d-0fb0-4479-bf08-31e2cca1b18d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51784", "type": "seen", "source": "https://t.me/cvedetector/10289", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51784 - VietFriend FriendStore for WooCommerce Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-51784 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VietFriend team FriendStore for WooCommerce allows Reflected XSS.This issue affects FriendStore for WooCommerce: from n/a through 1.4.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:42.000000Z"}, {"uuid": "7e7528a6-9a99-4960-a239-8dc6f582055c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51781", "type": "seen", "source": "https://t.me/cvedetector/10304", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51781 - Loop Now Technologies, Inc. Firework Shoppable Live Video Reflected XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51781 \nPublished : Nov. 9, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Loop Now Technologies, Inc. Firework Shoppable Live Video allows Reflected XSS.This issue affects Firework Shoppable Live Video: from n/a through 6.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T12:27:12.000000Z"}, {"uuid": "cf373f15-c522-4ca5-ab60-efbc24fe703d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51780", "type": "seen", "source": "https://t.me/cvedetector/10303", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51780 - Eewee Admin Custom XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51780 \nPublished : Nov. 9, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael DUMONTET eewee admin custom allows Reflected XSS.This issue affects eewee admin custom: from n/a through 1.8.2.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T12:27:12.000000Z"}, {"uuid": "fc3fe283-3c78-499c-8f3f-da5b2d0ca067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51783", "type": "seen", "source": "https://t.me/cvedetector/10288", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51783 - Zaus Forms Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-51783 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in zaus Forms: 3rd-Party Post Again allows Reflected XSS.This issue affects Forms: 3rd-Party Post Again: from n/a through 0.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:41.000000Z"}, {"uuid": "ec6ecaba-337a-4ba1-b138-512addb5124c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51787", "type": "seen", "source": "https://t.me/cvedetector/10287", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51787 - QuomodoSoft ElementsReady Addons for Elementor Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51787 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in QuomodoSoft ElementsReady Addons for Elementor allows Stored XSS.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:40.000000Z"}, {"uuid": "24cf7b2f-ca57-4bdb-9220-280dd531d739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51782", "type": "seen", "source": "https://t.me/cvedetector/10295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51782 - Sanjaysolutions Loginplus Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-51782 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sanjaysolutions Loginplus allows Stored XSS.This issue affects Loginplus: from n/a through 1.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:49.000000Z"}, {"uuid": "af873ba7-5925-4bd5-aeca-d33c04845fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51786", "type": "seen", "source": "https://t.me/cvedetector/10291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51786 - BestWebSoft Realty Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51786 \nPublished : Nov. 9, 2024, 9:15 a.m. | 28\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BestWebSoft Realty by BestWebSoft allows Stored XSS.This issue affects Realty by BestWebSoft: from n/a through 1.1.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:43.000000Z"}, {"uuid": "14b73612-9846-4348-818e-0191ec699424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51788", "type": "published-proof-of-concept", "source": "Telegram/2eBctvejsz4Cq0CvvHsAn8MVWplT5DtGo-xvSOxtHROW0yg", "content": "", "creation_timestamp": "2025-03-15T12:00:08.000000Z"}, {"uuid": "d358b7dd-6cae-429e-94e7-7b59c6b37c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51788", "type": "published-proof-of-concept", "source": "Telegram/GQL3nqjaQcgXsx-l7EnqpdkAK9ZsLBH2BY3jqlsf84Y49kY", "content": "", "creation_timestamp": "2025-03-15T10:00:06.000000Z"}, {"uuid": "5274b2c8-daaf-4058-a3bf-d7d404131d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5178", "type": "seen", "source": "https://t.me/cvedetector/557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5178 - ServiceNow has addressed a sensitive file read vul\", \n  \"Content\": \"CVE ID : CVE-2024-5178 \nPublished : July 10, 2024, 5:15 p.m. | 24\u00a0minutes ago \nDescription : ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server.\u00a0The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T19:43:22.000000Z"}]}