{"vulnerability": "CVE-2024-5244", "sightings": [{"uuid": "5d60c4d4-e041-483a-a9fd-e9ab4b9e4d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52441", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515002785927128", "content": "", "creation_timestamp": "2024-11-20T11:18:03.737881Z"}, {"uuid": "4fe8f6c7-1ab2-400c-8d9b-fae00f33d3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52443", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515002818725818", "content": "", "creation_timestamp": "2024-11-20T11:18:03.952064Z"}, {"uuid": "f86029d0-8c0a-4471-a382-f4ed23a328ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52444", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515002832380454", "content": "", "creation_timestamp": "2024-11-20T11:18:04.233373Z"}, {"uuid": "ac3e37ee-421c-41b7-ae67-b9786dbb24b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52446", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515061844446474", "content": "", "creation_timestamp": "2024-11-20T11:33:04.817699Z"}, {"uuid": "27c5a0f9-4923-4fde-bc7e-8a6e27de5654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52447", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515061877694840", "content": "", "creation_timestamp": "2024-11-20T11:33:05.163166Z"}, {"uuid": "5c7b0cc3-2d5c-4e55-8717-d3518c21478a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52449", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515070860298862", "content": "", "creation_timestamp": "2024-11-20T11:35:22.200878Z"}, {"uuid": "7648e196-6853-49b6-bba0-40b43c5e8fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52440", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515002771019188", "content": "", "creation_timestamp": "2024-11-20T11:18:03.181985Z"}, {"uuid": "f81f714f-1646-482c-bf2c-d334c4b2b591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113515061829951482", "content": "", "creation_timestamp": "2024-11-20T11:33:04.399901Z"}, {"uuid": "cdffded9-447a-4c26-a6bd-5ac2eb359800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5244", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mev5ydq6ox2e", "content": "", "creation_timestamp": "2026-02-15T08:54:32.865260Z"}, {"uuid": "9ac8154e-1aae-475f-86a9-e098a04de51a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5244", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3me7f227wvb2b", "content": "", "creation_timestamp": "2026-02-06T17:02:12.112851Z"}, {"uuid": "0387e99b-9252-4424-b8f6-40d576056b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5244", "type": "seen", "source": "https://bsky.app/profile/alexandreborges.bsky.social/post/3medzkuvjt222", "content": "", "creation_timestamp": "2026-02-08T13:20:11.778851Z"}, {"uuid": "abea34e5-705b-4761-ad97-f80fe52a1c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5244", "type": "seen", "source": "https://infosec.exchange/users/alexandreborges/statuses/116035210616130967", "content": "", "creation_timestamp": "2026-02-08T13:20:12.668908Z"}, {"uuid": "4683badc-0f4b-4ba9-8501-9694e6d08bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52449", "type": "seen", "source": "https://t.me/cvedetector/11590", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52449 - Navneil Naicer Bootscraper Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52449 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Navneil Naicer Bootscraper allows PHP Local File Inclusion.This issue affects Bootscraper: from n/a through 2.1.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:26.000000Z"}, {"uuid": "d50083cf-191b-4169-ae35-1f1f7bb1825f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52440", "type": "seen", "source": "https://t.me/cvedetector/11596", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52440 - Bueno Labs Pvt. Ltd. Xpresslane Fast Checkout Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52440 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Bueno Labs Pvt. Ltd. Xpresslane Fast Checkout allows Object Injection.This issue affects Xpresslane Fast Checkout: from n/a through 1.0.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:34.000000Z"}, {"uuid": "9bec3874-3d66-4568-8f55-596e634583de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52443", "type": "seen", "source": "https://t.me/cvedetector/11593", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52443 - Nerijus Masikonis Geolocator Deserialization of Untrusted Data Object Injection\", \n  \"Content\": \"CVE ID : CVE-2024-52443 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Nerijus Masikonis Geolocator allows Object Injection.This issue affects Geolocator: from n/a through 1.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:28.000000Z"}, {"uuid": "3b87b33c-97b3-4a32-bbd7-a8c652744fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52444", "type": "seen", "source": "https://t.me/cvedetector/11594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52444 - WPOPAL Opal Woo Custom Product Variation Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52444 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPOPAL Opal Woo Custom Product Variation allows Path Traversal.This issue affects Opal Woo Custom Product Variation: from n/a through 1.1.3. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:32.000000Z"}, {"uuid": "b165420b-8b0d-40c6-9560-8ce8b9975b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52448", "type": "seen", "source": "https://t.me/cvedetector/11589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52448 - WebCodingPlace Ultimate Classified Listings Path Traversal vulnerabilty\", \n  \"Content\": \"CVE ID : CVE-2024-52448 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WebCodingPlace Ultimate Classified Listings allows PHP Local File Inclusion.This issue affects Ultimate Classified Listings: from n/a through 1.4. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:26.000000Z"}, {"uuid": "996184cd-d46f-44f2-9a2a-e13003b86397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52447", "type": "seen", "source": "https://t.me/cvedetector/11588", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52447 - Corporate Zen Contact Page With Google Map Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-52447 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Path Traversal: '.../...//' vulnerability in Corporate Zen Contact Page With Google Map allows Path Traversal.This issue affects Contact Page With Google Map: from n/a through 1.6.1. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:22.000000Z"}, {"uuid": "ac1cdf79-32c6-4733-9467-faf5f588e473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52446", "type": "seen", "source": "https://t.me/cvedetector/11587", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52446 - Buying Buddy IDX CRM CSRF Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52446 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Buying Buddy Buying Buddy IDX CRM allows Object Injection.This issue affects Buying Buddy IDX CRM: from n/a through 1.1.12. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:21.000000Z"}, {"uuid": "eb7212d6-096d-432d-822f-09948d1a3cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52442", "type": "seen", "source": "https://t.me/cvedetector/11592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52442 - UserPlus Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-52442 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Incorrect Privilege Assignment vulnerability in Userplus UserPlus allows Privilege Escalation.This issue affects UserPlus: from n/a through 2.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:28.000000Z"}, {"uuid": "10221f29-ce5f-444a-b365-b18c5c6d7c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52441", "type": "seen", "source": "https://t.me/cvedetector/11591", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52441 - Rajesh Thanoch Quick Learn Prototype Pollution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52441 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Rajesh Thanoch Quick Learn allows Object Injection.This issue affects Quick Learn: from n/a through 1.0.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:27.000000Z"}, {"uuid": "a6a33bbb-1ef6-4d68-a34e-16188c4416dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52445", "type": "seen", "source": "https://t.me/cvedetector/11586", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52445 - Modeltheme QRMenu Restaurant QR Menu Lite Deserialization of Untrusted Data Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52445 \nPublished : Nov. 20, 2024, 12:15 p.m. | 28\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Modeltheme QRMenu Restaurant QR Menu Lite allows Object Injection.This issue affects QRMenu Restaurant QR Menu Lite: from n/a through 1.0.3. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T13:44:20.000000Z"}, {"uuid": "4c7803b9-2743-4320-8a18-ab335b658ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5244", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10813", "content": "#exploit\nWAN-to-LAN Exploit Showcase (CVE-2024-5242, CVE-2024-5243, CVE-2024-5244)\nhttps://claroty.com/team82/research/pwn2own-wan-to-lan-exploit-showcase", "creation_timestamp": "2024-07-10T17:39:07.000000Z"}]}