{"vulnerability": "CVE-2024-5479", "sightings": [{"uuid": "32791eff-098c-48d4-9d30-10428b789b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54790", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo62uwt372s", "content": "", "creation_timestamp": "2024-12-19T15:15:56.574218Z"}, {"uuid": "863b7e18-bcc8-4986-999c-8fa8b34302de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54790", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679923376649045", "content": "", "creation_timestamp": "2024-12-19T14:19:32.008192Z"}, {"uuid": "5bf175c8-095b-4ab0-ae46-f16545dee553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54792", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgebaz7w2k2h", "content": "", "creation_timestamp": "2025-01-22T21:02:01.987465Z"}, {"uuid": "48e6cb45-3ecf-497c-9cee-f48aa610aad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgebazbzmq27", "content": "", "creation_timestamp": "2025-01-22T21:02:02.613048Z"}, {"uuid": "4cdec55e-671b-4087-bc4c-316d7d97fd67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54795", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgebazedtq27", "content": "", "creation_timestamp": "2025-01-22T21:02:03.109136Z"}, {"uuid": "bb42a4f0-986b-407d-be05-6ddfaf3b88d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54792", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbhid5s5m2j", "content": "", "creation_timestamp": "2025-01-21T18:15:29.297433Z"}, {"uuid": "77d2a440-0b38-4943-a041-8eb47e415fa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbhifiesb2h", "content": "", "creation_timestamp": "2025-01-21T18:15:31.809515Z"}, {"uuid": "10678944-5301-482c-912a-9d67b3aeb11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54795", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbhihplw22n", "content": "", "creation_timestamp": "2025-01-21T18:15:33.886962Z"}, {"uuid": "bf2be26a-7a2a-4d34-8b7f-8b33649d48b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113868074986294647", "content": "", "creation_timestamp": "2025-01-21T19:49:05.371851Z"}, {"uuid": "bf478087-5273-4011-a039-80939d2c0d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbpthftec25", "content": "", "creation_timestamp": "2025-01-21T20:44:57.981277Z"}, {"uuid": "d7081715-249d-43e3-af89-cb870de3df3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54795", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2449", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54795\n\ud83d\udd39 Description: SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function.\n\ud83d\udccf Published: 2025-01-21T00:00:00\n\ud83d\udccf Modified: 2025-01-21T18:49:15.250Z\n\ud83d\udd17 References:\n1. https://github.com/MarioTesoro/CVE-2024-54795", "creation_timestamp": "2025-01-21T19:01:47.000000Z"}, {"uuid": "dfa61ece-93d0-47b0-8038-5d2c94ae87b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgdlb5ldw62y", "content": "", "creation_timestamp": "2025-01-22T14:28:26.302954Z"}, {"uuid": "1cb6aa48-352d-4860-b9c6-816d0ea7facf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "published-proof-of-concept", "source": "Telegram/JbFeOUrFSQU5kdhAk4BTFJOLtQ3FRUovTyaLVqdd_nkpbsY", "content": "", "creation_timestamp": "2025-01-27T20:00:05.000000Z"}, {"uuid": "f2e3e84a-e08b-4d25-ab23-e876abc5b7e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54790", "type": "seen", "source": "https://t.me/cvedetector/13336", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54790 - PHPGurukul Pre-School Enrollment System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54790 \nPublished : Dec. 19, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /index.php in PHPGurukul Pre-School Enrollment System v1.0, which allows remote attackers to execute arbitrary code via the visittime parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T17:19:39.000000Z"}, {"uuid": "9860e604-a2b2-4ba9-831d-fee2b282ec9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5479", "type": "seen", "source": "https://t.me/cvedetector/292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5479 - The Easy Pixels plugin for WordPress is vulnerable\", \n  \"Content\": \"CVE ID : CVE-2024-5479 \nPublished : July 9, 2024, 9:15 a.m. | 31\u00a0minutes ago \nDescription : The Easy Pixels plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 2.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T11:50:07.000000Z"}, {"uuid": "0130ad39-ad34-4b00-8175-bf3f540da1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54795", "type": "published-proof-of-concept", "source": "Telegram/JbFeOUrFSQU5kdhAk4BTFJOLtQ3FRUovTyaLVqdd_nkpbsY", "content": "", "creation_timestamp": "2025-01-27T20:00:05.000000Z"}, {"uuid": "29e4c47f-c0d0-457a-8e5a-d7537ef61fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54795", "type": "published-proof-of-concept", "source": "Telegram/x09wf5BV-L38GDGdLKlPP_ES7jGx8v3mUPVSlknfUHbTZ6U", "content": "", "creation_timestamp": "2025-01-18T22:00:06.000000Z"}, {"uuid": "a71e225e-870f-4657-a2d7-3060f7eefcc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54792", "type": "published-proof-of-concept", "source": "Telegram/x09wf5BV-L38GDGdLKlPP_ES7jGx8v3mUPVSlknfUHbTZ6U", "content": "", "creation_timestamp": "2025-01-18T22:00:06.000000Z"}, {"uuid": "2816db6d-eb02-42ea-9af4-93248175287c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54794", "type": "published-proof-of-concept", "source": "Telegram/x09wf5BV-L38GDGdLKlPP_ES7jGx8v3mUPVSlknfUHbTZ6U", "content": "", "creation_timestamp": "2025-01-18T22:00:06.000000Z"}]}