{"vulnerability": "cve-2024-5162", "sightings": [{"uuid": "02155bd5-551c-4dfc-b272-583b4eb9494e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51621", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452164504431503", "content": "", "creation_timestamp": "2024-11-09T08:57:27.314888Z"}, {"uuid": "fcf0a5b7-6cd7-4224-8717-55eadcd74c64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51620", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452262032828441", "content": "", "creation_timestamp": "2024-11-09T09:22:15.743342Z"}, {"uuid": "bf3ad8e6-d2c3-4e14-94a3-4207d1a84a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51625", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113452134582432880", "content": "", "creation_timestamp": "2024-11-09T08:49:50.772782Z"}, {"uuid": "a190816b-5b99-4cb6-9257-ea8e82921576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51627", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453298298990293", "content": "", "creation_timestamp": "2024-11-09T13:45:47.665497Z"}, {"uuid": "7763362f-dd05-4b23-a1de-3e48582a7528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51628", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453298315033840", "content": "", "creation_timestamp": "2024-11-09T13:45:47.976398Z"}, {"uuid": "f61da593-82b7-468f-9e9e-d651e9aeafaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51622", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453298270038749", "content": "", "creation_timestamp": "2024-11-09T13:45:47.322676Z"}, {"uuid": "c37e41be-fe26-4f3e-9f43-13d414761cee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51629", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453357313011381", "content": "", "creation_timestamp": "2024-11-09T14:00:48.214971Z"}, {"uuid": "4e050a8f-acae-44c2-b660-5ddf6781ecfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51623", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113453298284797267", "content": "", "creation_timestamp": "2024-11-09T13:45:47.462567Z"}, {"uuid": "b5343345-bc64-4572-86e9-2304046721b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51624", "type": "seen", "source": "https://t.me/cvedetector/21448", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51624 - J\u00e1-J\u00e1 Pagamentos for WooCommerce Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51624 \nPublished : March 28, 2025, 3:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos J\u00e1-J\u00e1 Pagamentos for WooCommerce allows Reflected XSS. This issue affects J\u00e1-J\u00e1 Pagamentos for WooCommerce: from n/a through 1.3.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T17:45:31.000000Z"}, {"uuid": "7f2f8845-063c-41d2-a9e3-c15ee8145daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51626", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miix46uluv2c", "content": "", "creation_timestamp": "2026-04-02T10:00:15.460605Z"}, {"uuid": "6dbab39e-b6cb-480e-bab2-06bef833f509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51624", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9377", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51624\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos J\u00e1-J\u00e1 Pagamentos for WooCommerce allows Reflected XSS. This issue affects J\u00e1-J\u00e1 Pagamentos for WooCommerce: from n/a through 1.3.0.\n\ud83d\udccf Published: 2025-03-28T15:12:24.688Z\n\ud83d\udccf Modified: 2025-03-28T15:12:24.688Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wc-ja-ja-pagamentos-multicaixa-express/vulnerability/wordpress-ja-ja-pagamentos-for-woocommerce-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-28T15:28:52.000000Z"}, {"uuid": "b1beffe6-8fb9-4b4b-b624-f6c760b64265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51622", "type": "seen", "source": "https://t.me/cvedetector/10383", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51622 - WP Experts Team WP EASY RECIPE Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51622 \nPublished : Nov. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Experts Team WP EASY RECIPE allows Stored XSS.This issue affects WP EASY RECIPE: from n/a through 1.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T16:26:04.000000Z"}, {"uuid": "0dec6b1b-271f-4f2f-86e7-fd45658ce0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51629", "type": "seen", "source": "https://t.me/cvedetector/10381", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51629 - MetricThemes Header Footer Composer for Elementor DOM-Based XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51629 \nPublished : Nov. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MetricThemes Header Footer Composer for Elementor allows DOM-Based XSS.This issue affects Header Footer Composer for Elementor: from n/a through 1.0.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T16:26:02.000000Z"}, {"uuid": "6258f032-47fd-40cd-b66d-7a347682df7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51625", "type": "seen", "source": "https://t.me/cvedetector/10294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51625 - EDC Team Quran Shortcode SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51625 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in EDC Team (E-Da`wah Committee) Quran Shortcode allows Blind SQL Injection.This issue affects Quran Shortcode: from n/a through 1.5. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:48.000000Z"}, {"uuid": "1537ef7e-215f-49aa-98e4-bed1ddad30d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51621", "type": "seen", "source": "https://t.me/cvedetector/10293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51621 - Reza Sh Download-Mirror-Counter SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51621 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Reza Sh Download-Mirror-Counter allows SQL Injection.This issue affects Download-Mirror-Counter: from n/a through 1.1. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:48.000000Z"}, {"uuid": "3ea79d09-4e53-4f2c-99ac-2d8ea04b074d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51620", "type": "seen", "source": "https://t.me/cvedetector/10292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51620 - Porsline SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51620 \nPublished : Nov. 9, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Porsline allows Blind SQL Injection.This issue affects Porsline: from n/a through 1.0.2. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T10:46:47.000000Z"}, {"uuid": "8e4b2a61-38df-4c7c-89d7-39e7c238cc97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51626", "type": "seen", "source": "https://t.me/cvedetector/9760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51626 - Mansur Ahamed Woocommerce Quote Calculator SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51626 \nPublished : Nov. 4, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T16:57:19.000000Z"}, {"uuid": "12503ae7-8ff5-42c7-9fcd-48720bd0bfc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51628", "type": "seen", "source": "https://t.me/cvedetector/10380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51628 - EzyOnlineBookings Online Booking System Widget DOM-Based XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51628 \nPublished : Nov. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EzyOnlineBookings EzyOnlineBookings Online Booking System Widget allows DOM-Based XSS.This issue affects EzyOnlineBookings Online Booking System Widget: from n/a through 1.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T16:26:01.000000Z"}, {"uuid": "ceac421a-65fe-4ade-833d-63e4cf0c2888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51627", "type": "seen", "source": "https://t.me/cvedetector/10379", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51627 - Kaedinger Audio Comparison Lite Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51627 \nPublished : Nov. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kaedinger Audio Comparison Lite audio-comparison-lite allows Stored XSS.This issue affects Audio Comparison Lite: from n/a through 3.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T16:25:55.000000Z"}, {"uuid": "70cb9a9d-d87c-46a0-87ad-df95ad34b4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51623", "type": "seen", "source": "https://t.me/cvedetector/10378", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51623 - Mehrdad Farahani WP EIS SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51623 \nPublished : Nov. 9, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mehrdad Farahani WP EIS allows SQL Injection.This issue affects WP EIS: from n/a through 1.3.3. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T16:25:54.000000Z"}]}