{"vulnerability": "CVE-2024-5600", "sightings": [{"uuid": "c5cade82-0f80-43c0-afb3-9f6a3c85fa8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673784470613830", "content": "", "creation_timestamp": "2024-12-18T12:18:19.697690Z"}, {"uuid": "6456b983-bb4c-4709-a568-ecc7f2a24791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113663946398826065", "content": "", "creation_timestamp": "2024-12-16T18:36:22.552768Z"}, {"uuid": "8a33e0a5-b902-47fa-9477-81146ebe381f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56004", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113663946412625959", "content": "", "creation_timestamp": "2024-12-16T18:36:23.012679Z"}, {"uuid": "8657e39f-3d70-466c-b6cc-b38a40b5c309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56005", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113663946428126129", "content": "", "creation_timestamp": "2024-12-16T18:36:23.253725Z"}, {"uuid": "13ec6aa1-383f-4fdc-b32d-aa7662dc9de5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113664005430548735", "content": "", "creation_timestamp": "2024-12-16T18:51:23.358724Z"}, {"uuid": "1e06ec88-cf69-44a8-a971-ea79c63b4757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56009", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113664005444571119", "content": "", "creation_timestamp": "2024-12-16T18:51:23.563457Z"}, {"uuid": "5c893adb-2f34-41b2-a122-b5b5d521b969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56002", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113747773294036065", "content": "", "creation_timestamp": "2024-12-31T13:54:39.488460Z"}, {"uuid": "42ea601b-d29d-4c08-b675-2f270a298f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56002", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lemacpe3by2c", "content": "", "creation_timestamp": "2024-12-31T14:15:58.086569Z"}, {"uuid": "140de937-6cec-40f3-90d2-3a54f230f5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lii3bwklii2n", "content": "", "creation_timestamp": "2025-02-18T20:16:10.874094Z"}, {"uuid": "d8f30ffe-ead3-42ea-bb7a-c2b2179b1f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114027325578762858", "content": "", "creation_timestamp": "2025-02-18T22:48:29.979527Z"}, {"uuid": "17d7ea51-fb27-430e-999a-bb23f67db869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56000", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lir72by7mk2m", "content": "", "creation_timestamp": "2025-02-22T11:17:27.694712Z"}, {"uuid": "66dc1178-696c-4c98-9bd3-0f50103c16ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lijpzznyfk25", "content": "", "creation_timestamp": "2025-02-19T12:00:15.304680Z"}, {"uuid": "055e2580-df9a-4992-aa52-1fd4fea75ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3likychaivc2p", "content": "", "creation_timestamp": "2025-02-20T00:00:47.734162Z"}, {"uuid": "b1fcd2cf-b124-4660-b9f7-88bffe259802", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56003", "type": "seen", "source": "https://t.me/cvedetector/13000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56003 - Caldera SMTP Mailer Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56003 \nPublished : Dec. 16, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : Missing Authorization vulnerability in David Cramer Caldera SMTP Mailer.This issue affects Caldera SMTP Mailer: from n/a through 1.0.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T18:10:59.000000Z"}, {"uuid": "5401bd92-6606-4c6a-85f1-855c612d9be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljumyhepnz2r", "content": "", "creation_timestamp": "2025-03-08T13:30:08.995597Z"}, {"uuid": "ef66eef2-8706-48d1-bb41-2b2f04453fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}, {"uuid": "968262e9-4212-4765-90db-6e29feeb8fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56002", "type": "seen", "source": "https://t.me/cvedetector/14029", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56002 - MightyForms Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56002 \nPublished : Dec. 31, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Porthas Inc. Contact Form, Survey &amp; Form Builder \u2013 MightyForms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form, Survey &amp; Form Builder \u2013 MightyForms: from n/a through 1.3.9. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T16:13:26.000000Z"}, {"uuid": "bff31292-62a7-490d-8d19-4c17baf1a62d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56001", "type": "seen", "source": "https://t.me/cvedetector/12982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56001 - Ksher Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56001 \nPublished : Dec. 16, 2024, 3:15 p.m. | 1\u00a0hour ago \nDescription : Missing Authorization vulnerability in Ksher Ksher allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ksher: from n/a through 1.1.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T17:20:30.000000Z"}, {"uuid": "888feab4-d798-4088-afa2-8d46e693e486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56008", "type": "seen", "source": "https://t.me/cvedetector/13187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56008 - Spreadr Woocommerce Missing Authorization\", \n  \"Content\": \"CVE ID : CVE-2024-56008 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Missing Authorization vulnerability in spreadr Spreadr Woocommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Spreadr Woocommerce: from n/a through 1.0.4. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:40.000000Z"}, {"uuid": "2f12c850-8635-4069-a6a1-ed3177bebe97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56000", "type": "seen", "source": "Telegram/cPZDBZmgSZh95mYNTNr_VB5g9Oa9P7rs7myO16SoNVzRYZA4", "content": "", "creation_timestamp": "2025-02-19T15:39:53.000000Z"}, {"uuid": "5badb51f-e151-45e7-969f-3170b2b80a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56009", "type": "seen", "source": "https://t.me/cvedetector/12986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56009 - Spreadr Woocommerce Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56009 \nPublished : Dec. 16, 2024, 3:15 p.m. | 1\u00a0hour ago \nDescription : Missing Authorization vulnerability in spreadr Spreadr Woocommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Spreadr Woocommerce: from n/a through 1.0.4. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T17:20:36.000000Z"}, {"uuid": "5b4c5dda-5247-4669-8ea6-e9825a8e8458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56007", "type": "seen", "source": "https://t.me/cvedetector/12985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56007 - Ram Segev Leader Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56007 \nPublished : Dec. 16, 2024, 3:15 p.m. | 1\u00a0hour ago \nDescription : Missing Authorization vulnerability in Ram Segev Leader allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Leader: from n/a through 2.6.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T17:20:35.000000Z"}, {"uuid": "990b9eea-ba3e-43a7-8f7f-6759051a59fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56005", "type": "seen", "source": "https://t.me/cvedetector/12984", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56005 - Posti Shipping CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-56005 \nPublished : Dec. 16, 2024, 3:15 p.m. | 1\u00a0hour ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Posti Posti Shipping allows Cross Site Request Forgery.This issue affects Posti Shipping: from n/a through 3.10.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T17:20:32.000000Z"}, {"uuid": "6891e240-269e-4148-a0ad-c791326aa559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56004", "type": "seen", "source": "https://t.me/cvedetector/12983", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56004 - Alex W Fowler Easy Site Importer Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56004 \nPublished : Dec. 16, 2024, 3:15 p.m. | 1\u00a0hour ago \nDescription : Missing Authorization vulnerability in Alex W Fowler Easy Site Importer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Site Importer: from n/a through 1.0.1. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T17:20:31.000000Z"}, {"uuid": "ad55cef1-8843-476c-b9dc-3cf7459cfd8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5600", "type": "seen", "source": "https://t.me/cvedetector/289", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5600 - The SCSS Happy Compiler \u2013 Compile SCSS to CSS &amp; Au\", \n  \"Content\": \"CVE ID : CVE-2024-5600 \nPublished : July 9, 2024, 9:15 a.m. | 31\u00a0minutes ago \nDescription : The SCSS Happy Compiler \u2013 Compile SCSS to CSS &amp; Automatic Enqueue plugin for WordPress is vulnerable to Stored Cross-Site Scripting due to a missing capability check and insufficient sanitization on the import_settings() function in all versions up to, and including, 1.3.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject malicious web scripts. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T11:50:01.000000Z"}]}