{"vulnerability": "CVE-2024-5165", "sightings": [{"uuid": "4317cce6-0517-479c-8e0a-cb148765d6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51650", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511363803152661", "content": "", "creation_timestamp": "2024-11-19T19:52:36.909407Z"}, {"uuid": "dd7a6350-b327-4d9a-a901-5049af59dfbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51652", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511363816881004", "content": "", "creation_timestamp": "2024-11-19T19:52:37.360679Z"}, {"uuid": "ad57a688-f25d-4a10-a60a-b8e91b6bdb06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51656", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511422856943325", "content": "", "creation_timestamp": "2024-11-19T20:07:38.100246Z"}, {"uuid": "83ec06e6-fc6e-4b6f-b5dc-5acde77e38cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51653", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511422815143195", "content": "", "creation_timestamp": "2024-11-19T20:07:37.601525Z"}, {"uuid": "e41e5126-67ac-4588-a943-08797f61559a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51654", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511422829160724", "content": "", "creation_timestamp": "2024-11-19T20:07:37.759474Z"}, {"uuid": "acd11fa8-fa9d-4ae1-af36-8c00e7fc4bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51655", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511422842923154", "content": "", "creation_timestamp": "2024-11-19T20:07:37.802320Z"}, {"uuid": "26b635f7-f392-46ac-923b-1bf66e57c6de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51659", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113483478254296314", "content": "", "creation_timestamp": "2024-11-14T21:40:57.159424Z"}, {"uuid": "b41babfb-0aaa-414a-a8cd-cc595a2c86cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51658", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113483478240278922", "content": "", "creation_timestamp": "2024-11-14T21:40:57.332549Z"}, {"uuid": "9c364ab3-566f-4457-a274-7b9796518e27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51657", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511481859768150", "content": "", "creation_timestamp": "2024-11-19T20:22:38.368975Z"}, {"uuid": "822c068f-3e84-46d7-902c-7367d7ec0399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51651", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113786762733352761", "content": "", "creation_timestamp": "2025-01-07T11:10:11.228689Z"}, {"uuid": "750c8da3-81a6-4c7e-b06b-25ed1e2ea79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51651", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5jiwozpb2e", "content": "", "creation_timestamp": "2025-01-07T11:15:46.161462Z"}, {"uuid": "ea264fc4-1145-4cca-ad2b-61736c9bbe6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51651", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5jiwozpb2e", "content": "", "creation_timestamp": "2025-01-07T11:15:46.168637Z"}, {"uuid": "d4c703e6-ddd7-4676-a5ce-ed16242163d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51651", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/402", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51651\n\ud83d\udd39 Description: Missing Authorization vulnerability in CubeWP CubeWP Forms \u2013 All-in-One Form Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CubeWP Forms \u2013 All-in-One Form Builder: from n/a through 1.1.5.\n\ud83d\udccf Published: 2025-01-07T10:49:30.530Z\n\ud83d\udccf Modified: 2025-01-07T10:49:30.530Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/cubewp-forms/vulnerability/wordpress-cubewp-forms-plugin-1-1-5-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-07T11:38:30.000000Z"}, {"uuid": "5f5aff2e-1fa3-4387-8c0d-fde16a78863b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5165", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3666", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5165\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-05-23T10:15:10.183\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\n2. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\n3. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\n4. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\n5. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\n6. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\n7. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\n8. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\n9. https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\n10. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\n11. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\n12. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\n13. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\n14. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\n15. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\n16. https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211", "creation_timestamp": "2025-01-31T15:25:07.000000Z"}, {"uuid": "6bfdfff4-8b02-4562-843f-86135389f4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51659", "type": "seen", "source": "https://t.me/cvedetector/11014", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51659 - Twitter @Anywhere Plus CSRF Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51659 \nPublished : Nov. 14, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in GeekRMX Twitter @Anywhere Plus allows Stored XSS.This issue affects Twitter @Anywhere Plus: from n/a through 2.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T00:11:30.000000Z"}, {"uuid": "647491ad-982e-4fca-a896-8c3e50d44947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51658", "type": "seen", "source": "https://t.me/cvedetector/11013", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51658 - Henrik Hoff WP Course Manager CSRF Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51658 \nPublished : Nov. 14, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Henrik Hoff WP Course Manager allows Stored XSS.This issue affects WP Course Manager: from n/a through 1.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T00:11:29.000000Z"}, {"uuid": "c9c75df4-e2ae-4398-8c08-b4f401748353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5165", "type": "seen", "source": "Telegram/J8IouemapJJHqkdN7xkY3wqcRhWpZngoFnzS2gLiZDwLPHVQ", "content": "", "creation_timestamp": "2025-02-01T17:28:09.000000Z"}]}