{"vulnerability": "CVE-2024-5626", "sightings": [{"uuid": "37e94be9-9062-4013-a473-af5f5c66afbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56265", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113747013123738714", "content": "", "creation_timestamp": "2024-12-31T10:41:20.294224Z"}, {"uuid": "df587fee-09a7-4bbd-ae72-be675b55b39d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56263", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2u33cxg2f", "content": "", "creation_timestamp": "2025-01-02T12:21:37.138571Z"}, {"uuid": "5f27c995-d394-4ba3-baca-c80f09be7ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56267", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ucpw462f", "content": "", "creation_timestamp": "2025-01-02T12:21:44.828608Z"}, {"uuid": "4ec689fe-79a7-4fc0-bcb5-08deffac3835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56262", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tyuxa22a", "content": "", "creation_timestamp": "2025-01-02T12:21:34.560103Z"}, {"uuid": "73823710-3372-4771-abca-ecdfd1f9c23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56260", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tuadmi2c", "content": "", "creation_timestamp": "2025-01-02T12:21:29.631967Z"}, {"uuid": "08b26193-45fd-43bc-82cf-d1c4a1002eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56261", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2twmim52i", "content": "", "creation_timestamp": "2025-01-02T12:21:32.427218Z"}, {"uuid": "d0c3325a-017a-42ef-9cd0-2f2d6a5880fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2u5k4gw2f", "content": "", "creation_timestamp": "2025-01-02T12:21:39.588600Z"}, {"uuid": "1c8ffa05-19af-436e-971b-3c9c2fd3c9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56266", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2uagz2n2i", "content": "", "creation_timestamp": "2025-01-02T12:21:42.437788Z"}, {"uuid": "1792c6f3-97b5-4ffb-8228-e600c0e74e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56262", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zporn52r", "content": "", "creation_timestamp": "2025-01-02T12:42:42.889657Z"}, {"uuid": "784a457a-38f9-41c6-b3c3-caa8cc9a18e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56260", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zpsbeq2b", "content": "", "creation_timestamp": "2025-01-02T12:42:43.636227Z"}, {"uuid": "5b531e81-e39e-45bf-a0e5-58bebf283f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56263", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zq2spl2k", "content": "", "creation_timestamp": "2025-01-02T12:42:44.699582Z"}, {"uuid": "95974983-e094-4a2a-9bc4-1ef33c9da7fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56261", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zqh2tq2q", "content": "", "creation_timestamp": "2025-01-02T12:42:46.289259Z"}, {"uuid": "c9369e06-2ece-4e60-a59f-33e015335f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56268", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler5uucmrd2a", "content": "", "creation_timestamp": "2025-01-02T13:15:44.818857Z"}, {"uuid": "00c73edf-1fd8-4874-b54a-9987a6acceb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56260", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760745298511329", "content": "", "creation_timestamp": "2025-01-02T20:53:36.797131Z"}, {"uuid": "a148b5e4-df6b-4605-a405-9b7a768c629d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56261", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760745313215456", "content": "", "creation_timestamp": "2025-01-02T20:53:37.009486Z"}, {"uuid": "e7217063-3b33-462c-a701-e2a051252be0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56262", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760745327994488", "content": "", "creation_timestamp": "2025-01-02T20:53:37.245038Z"}, {"uuid": "d7d6c3d8-9836-4769-8336-90e40cabdf12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56263", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760804324394198", "content": "", "creation_timestamp": "2025-01-02T21:08:37.233906Z"}, {"uuid": "6d2e09e6-19f8-4f77-b855-bb15728f4ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760804339589272", "content": "", "creation_timestamp": "2025-01-02T21:08:37.550190Z"}, {"uuid": "2020919a-24f5-4387-97d8-15d1cadaff57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56266", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760804353760738", "content": "", "creation_timestamp": "2025-01-02T21:08:37.771216Z"}, {"uuid": "9df7ba2f-881c-47ed-8587-4cb750d8889d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56267", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760804368101960", "content": "", "creation_timestamp": "2025-01-02T21:08:37.869094Z"}, {"uuid": "7d3f5fad-d7d0-4fc7-9eb9-6de8c540a2f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56268", "type": "seen", "source": "https://t.me/cvedetector/14139", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56268 - WordPress Hait Post Grid Elementor Addon Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56268 \nPublished : Jan. 2, 2025, 1:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Hait Post Grid Elementor Addon allows Stored XSS.This issue affects Post Grid Elementor Addon: from n/a through 2.0.18. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T15:05:24.000000Z"}, {"uuid": "7013f7d1-ed6f-45fc-ad6e-9de49298def1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56266", "type": "seen", "source": "https://t.me/cvedetector/14122", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56266 - Sonaar Music MP3 Audio Player Missing Authorization Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-56266 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio &amp; Podcast by Sonaar allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects MP3 Audio Player for Music, Radio &amp; Podcast by Sonaar: from n/a through 5.8. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:14:59.000000Z"}, {"uuid": "b56a95a8-a5c4-4697-9dcb-b8c9500daf6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "seen", "source": "https://t.me/cvedetector/14121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56264 - Beee ACF City Selector File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56264 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Beee ACF City Selector allows Upload a Web Shell to a Web Server.This issue affects ACF City Selector: from n/a through 1.14.0. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:14:58.000000Z"}, {"uuid": "e5ea4f4b-2fa3-4030-8205-cd5f973825e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56267", "type": "seen", "source": "https://t.me/cvedetector/14123", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56267 - Fla-shop.com Interactive UK Map Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56267 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fla-shop.com Interactive UK Map allows Stored XSS.This issue affects Interactive UK Map: from n/a through 3.4.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:00.000000Z"}, {"uuid": "66c868a5-1545-4e1e-9abd-0ae425b0cab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56263", "type": "seen", "source": "https://t.me/cvedetector/14120", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56263 - GS Plugins GS Shots for Dribbble Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56263 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GS Plugins GS Shots for Dribbble allows DOM-Based XSS.This issue affects GS Shots for Dribbble: from n/a through 1.2.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:14:58.000000Z"}, {"uuid": "248593fc-e8ac-40e4-8c20-9736403406e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56262", "type": "seen", "source": "https://t.me/cvedetector/14119", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56262 - GS Plugins GS Coaches Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-56262 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GS Plugins GS Coaches allows Stored XSS.This issue affects GS Coaches: from n/a through 1.1.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:14:57.000000Z"}, {"uuid": "60383ce1-35e3-4043-bb4d-55dea35380c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56265", "type": "seen", "source": "https://t.me/cvedetector/13989", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56265 - WPFWeb WooCommerce PDF Vouchers Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56265 \nPublished : Dec. 31, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPWeb WooCommerce PDF Vouchers allows Reflected XSS.This issue affects WooCommerce PDF Vouchers: from n/a before 4.9.9. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T12:52:12.000000Z"}, {"uuid": "39c67a56-8f6c-45c2-9acc-38c069c9a6c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56260", "type": "seen", "source": "https://t.me/cvedetector/14129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56260 - Apache ShopElement Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56260 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StorePlugin ShopElement allows Stored XSS.This issue affects ShopElement: from n/a through 2.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:10.000000Z"}, {"uuid": "914fb066-b4ad-4131-b3c9-79321d3ecaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56261", "type": "seen", "source": "https://t.me/cvedetector/14130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56261 - GS Plugins Project Showcase Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56261 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GS Plugins Project Showcase allows Stored XSS.This issue affects Project Showcase: from n/a through 1.1.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:11.000000Z"}, {"uuid": "a7f0e818-dd6a-41dc-a4d9-438b8439a38f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5626", "type": "seen", "source": "https://t.me/cvedetector/708", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5626 - The Inline Related Posts WordPress plugin before 3\", \n  \"Content\": \"CVE ID : CVE-2024-5626 \nPublished : July 12, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Inline Related Posts WordPress plugin before 3.7.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T09:23:17.000000Z"}, {"uuid": "ce513002-6f27-44c6-b2d7-c68d5748a7f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "published-proof-of-concept", "source": "Telegram/x-xQYLiT6c2KwAclOItHPJ6mMLNM1F62QdJruxX3gagbh9k", "content": "", "creation_timestamp": "2025-03-01T00:00:11.000000Z"}, {"uuid": "aecd781a-ea02-4baa-9168-24521e04e692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "published-proof-of-concept", "source": "Telegram/H3VYP4xq1LHh3GJQ0Zs8eCPmQj2DpyXdr_t_e5J-4xZUbbk", "content": "", "creation_timestamp": "2025-02-25T04:00:06.000000Z"}, {"uuid": "bdca2e51-48d2-41e3-b472-0b40a08c73f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56264", "type": "published-proof-of-concept", "source": "Telegram/H0UoOtlwQBruXLDIbs-u7bTNgReUB49mzBAJ6VS-GnjlUf4", "content": "", "creation_timestamp": "2025-02-25T04:00:13.000000Z"}]}