{"vulnerability": "CVE-2024-5630", "sightings": [{"uuid": "1279f70b-07fc-4dc0-872d-ae5788c03202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56301", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmwdo2hzh2n", "content": "", "creation_timestamp": "2025-01-13T14:15:23.959221Z"}, {"uuid": "24182572-c5ef-438b-afed-274b3c899e67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56302", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2uf2zhl25", "content": "", "creation_timestamp": "2025-01-02T12:21:47.633855Z"}, {"uuid": "61c9a013-444f-4ce7-9a5e-258e47ea21d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56300", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113787235144997826", "content": "", "creation_timestamp": "2025-01-07T13:10:19.685087Z"}, {"uuid": "69aa5cf5-7afc-4546-a323-2b2d06b45313", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56300", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5jl54knt2a", "content": "", "creation_timestamp": "2025-01-07T11:16:59.853184Z"}, {"uuid": "8cd5b2a9-d9c8-4af1-b580-16603cf76184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56302", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760863372985993", "content": "", "creation_timestamp": "2025-01-02T21:23:38.237035Z"}, {"uuid": "26bbcb3e-9abd-4ab1-afc9-4861f434c6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56301", "type": "seen", "source": "https://t.me/cvedetector/15153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56301 - Eniture Technology Distance Based Shipping Calculator Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56301 \nPublished : Jan. 13, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eniture Technology Distance Based Shipping Calculator allows Reflected XSS.This issue affects Distance Based Shipping Calculator: from n/a through 2.0.21. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T16:14:29.000000Z"}, {"uuid": "64345b1b-6442-427c-8281-c8463d5756e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5630", "type": "seen", "source": "https://t.me/cvedetector/847", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5630 - The Insert or Embed Articulate Content into WordPr\", \n  \"Content\": \"CVE ID : CVE-2024-5630 \nPublished : July 15, 2024, 6:15 a.m. | 40\u00a0minutes ago \nDescription : The Insert or Embed Articulate Content into WordPress plugin before 4.3000000024 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T09:19:14.000000Z"}, {"uuid": "ddc14563-feed-4fcd-a77a-323b704413da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56302", "type": "seen", "source": "https://t.me/cvedetector/14124", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56302 - ConvertCalculator for WordPress Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56302 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ConvertCalculator ConvertCalculator for WordPress allows Stored XSS.This issue affects ConvertCalculator for WordPress: from n/a through 1.1.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:03.000000Z"}]}