{"vulnerability": "CVE-2024-52427", "sightings": [{"uuid": "03316d3a-aaf1-4ef1-b2aa-85421ac9f4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52427", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113504413335244833", "content": "", "creation_timestamp": "2024-11-18T14:25:01.567795Z"}, {"uuid": "7f66ed16-3800-4d0b-b03e-a5af2d17a79e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52427", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "1adb5df8-80c4-4fda-b82d-31cdef56b258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52427", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miitquyhv42c", "content": "", "creation_timestamp": "2026-04-02T09:00:15.440612Z"}, {"uuid": "5043ac59-4f17-42fd-9b53-89109549831d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52427", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9190", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aEvent Tickets with Ticket Scanner WordPress \ud50c\ub7ec\uadf8\uc778(CVE-2024-52427)\uc758 \ubd88\uc644\uc804 \ud328\uce58 \ubc1c\uacac \ubc0f \uad8c\ud55c \uaca9\ud558(Author \u2192 Contributor) \ucde8\uc57d\uc810 \ubd84\uc11d\nURL\uff1ahttps://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-26T18:34:10.000000Z"}, {"uuid": "cf3e7541-29d1-4c29-9e6e-d9c6a3de9c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52427", "type": "seen", "source": "https://t.me/cvedetector/11348", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52427 - Apache Event Tickets Sasi Security Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-52427 \nPublished : Nov. 18, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Saso Nikolov Event Tickets with Ticket Scanner allows Server Side Include (SSI) Injection.This issue affects Event Tickets with Ticket Scanner: from n/a through 2.3.11. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T17:23:14.000000Z"}]}