{"vulnerability": "cve-2024-5625", "sightings": [{"uuid": "057a55fb-4465-495c-bc75-ec28657d6eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56256", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113747013109792031", "content": "", "creation_timestamp": "2024-12-31T10:41:20.024802Z"}, {"uuid": "dbe41336-3332-46d8-abf0-072a6f6a9c0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56256", "type": "seen", "source": "https://bsky.app/profile/wiretor.bsky.social/post/3lemfkjb2us26", "content": "", "creation_timestamp": "2024-12-31T15:49:57.487264Z"}, {"uuid": "866a42b6-9552-4744-b5dc-0eb2546475fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56253", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2thgadj2l", "content": "", "creation_timestamp": "2025-01-02T12:21:16.132320Z"}, {"uuid": "b04253e8-bb29-4d98-bdd1-8c56a3cbf3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56255", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tmvsir2l", "content": "", "creation_timestamp": "2025-01-02T12:21:21.938830Z"}, {"uuid": "6973a5fc-faac-41f6-84e6-00d1eb56ff4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56250", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ta73nl25", "content": "", "creation_timestamp": "2025-01-02T12:21:08.676913Z"}, {"uuid": "63db0e23-30de-4782-9707-96a1a99d8a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56254", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tjps5x2m", "content": "", "creation_timestamp": "2025-01-02T12:21:18.613385Z"}, {"uuid": "6fff8ab2-bfc7-4ec8-9e2e-14ef0439178b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56251", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tceu3325", "content": "", "creation_timestamp": "2025-01-02T12:21:10.852344Z"}, {"uuid": "67fe6541-9f3f-4224-9146-4fc54e52c57e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56252", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2teumil2e", "content": "", "creation_timestamp": "2025-01-02T12:21:13.465206Z"}, {"uuid": "a4e19c64-ee75-4bf2-9fc8-d950b497d0b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56258", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2tp5izy25", "content": "", "creation_timestamp": "2025-01-02T12:21:24.325938Z"}, {"uuid": "075424cc-a45f-4192-9b58-1d3b2ecdc162", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56259", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2trqej52i", "content": "", "creation_timestamp": "2025-01-02T12:21:27.011947Z"}, {"uuid": "7ca64f5e-7ca7-4de3-9f73-7f2d6221080d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56251", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zohnpj2i", "content": "", "creation_timestamp": "2025-01-02T12:42:38.923687Z"}, {"uuid": "c0dc0f67-f91f-4af4-817f-690474c45985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56252", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zor73y2u", "content": "", "creation_timestamp": "2025-01-02T12:42:39.719364Z"}, {"uuid": "655cb4c5-78a3-459d-8dd0-e46b80a72365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56254", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zp4frd2w", "content": "", "creation_timestamp": "2025-01-02T12:42:41.530817Z"}, {"uuid": "4a457536-bea0-408f-a446-4c52bb890344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56253", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zpl4rn2y", "content": "", "creation_timestamp": "2025-01-02T12:42:42.377476Z"}, {"uuid": "a78aea0d-bf92-4a69-9ea9-08cc3929c1c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56250", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zpvkyj2e", "content": "", "creation_timestamp": "2025-01-02T12:42:44.183355Z"}, {"uuid": "0a6a7187-fc5a-45c2-8b4c-d2bdef932631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56259", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zq67lm2g", "content": "", "creation_timestamp": "2025-01-02T12:42:45.193923Z"}, {"uuid": "1ce1ac45-2e56-48ce-8938-d1005e1e7808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56255", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zqbetj2g", "content": "", "creation_timestamp": "2025-01-02T12:42:45.743858Z"}, {"uuid": "0b739b55-27e0-4cf2-a430-456b2ff7565b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56258", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ler3zqkis52q", "content": "", "creation_timestamp": "2025-01-02T12:42:46.903260Z"}, {"uuid": "19cf59c6-f954-4af6-8cb4-7a94a3f10b66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56257", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler5urncae22", "content": "", "creation_timestamp": "2025-01-02T13:15:41.638568Z"}, {"uuid": "97d35a7b-3eb0-4175-af25-62c5f4b63fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56257", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lercql7dgr2g", "content": "", "creation_timestamp": "2025-01-02T14:42:52.352173Z"}, {"uuid": "2ec18622-d7bb-4167-b211-efa0beabfdc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56250", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760627207461841", "content": "", "creation_timestamp": "2025-01-02T20:23:34.763276Z"}, {"uuid": "ed210cec-7f3e-45fa-b2e7-f28339ba670e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56251", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760627221882609", "content": "", "creation_timestamp": "2025-01-02T20:23:34.957342Z"}, {"uuid": "902f8fdb-d55f-4957-bd45-c324bdb80419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56252", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760627235959469", "content": "", "creation_timestamp": "2025-01-02T20:23:35.242244Z"}, {"uuid": "974837f9-7f7a-43fa-8704-19448e8dfde2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56253", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760686239303580", "content": "", "creation_timestamp": "2025-01-02T20:38:35.442663Z"}, {"uuid": "4e6c47b9-d161-4bb6-9290-00e368837a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56254", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760686253015420", "content": "", "creation_timestamp": "2025-01-02T20:38:35.779013Z"}, {"uuid": "c3a04ff2-85bf-497a-9541-a2463788e1ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56255", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760686267536951", "content": "", "creation_timestamp": "2025-01-02T20:38:35.859609Z"}, {"uuid": "5d3310e3-bfd4-4a72-8656-e6f52de81925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56258", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760686281656499", "content": "", "creation_timestamp": "2025-01-02T20:38:36.177052Z"}, {"uuid": "8f58b65a-e427-4c72-ab03-d6712a0535e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56259", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760745284957576", "content": "", "creation_timestamp": "2025-01-02T20:53:36.723565Z"}, {"uuid": "dc45b68d-9cfd-48ec-a40d-4ffc5f5caaa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56257", "type": "seen", "source": "https://t.me/cvedetector/14140", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56257 - CoolPlugins Coins MarketCap DOM-Based Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56257 \nPublished : Jan. 2, 2025, 1:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CoolPlugins Coins MarketCap allows DOM-Based XSS.This issue affects Coins MarketCap: from n/a through 5.5.8. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T15:05:25.000000Z"}, {"uuid": "263a0d41-3d89-4a7c-8d15-dd345bcd24c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56251", "type": "seen", "source": "https://t.me/cvedetector/14138", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56251 - Event Espresso CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56251 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Event Espresso Event Espresso 4 Decaf allows Cross Site Request Forgery.This issue affects Event Espresso 4 Decaf: from n/a through 5.0.28.decaf. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:21.000000Z"}, {"uuid": "755035e4-d0eb-4d3f-b763-91e1fce7ca82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56250", "type": "seen", "source": "https://t.me/cvedetector/14137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56250 - GregRoss Just Writing Statistics SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56250 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GregRoss Just Writing Statistics allows SQL Injection.This issue affects Just Writing Statistics: from n/a through 4.7. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:20.000000Z"}, {"uuid": "bc25d2a1-631e-4461-8117-7d9c8bf10b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56259", "type": "seen", "source": "https://t.me/cvedetector/14128", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56259 - AyeCode WP Business Directory Plugins GeoDirectory Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56259 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AyeCode - WP Business Directory Plugins GeoDirectory allows Stored XSS.This issue affects GeoDirectory: from n/a through 2.3.84. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:07.000000Z"}, {"uuid": "ba43e774-4940-4cc7-bf76-7b70e63edec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56258", "type": "seen", "source": "https://t.me/cvedetector/14127", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56258 - \"WPBlockArt Magazine Blocks Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-56258 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBlockArt Magazine Blocks allows Stored XSS.This issue affects Magazine Blocks: from n/a through 1.3.20. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:06.000000Z"}, {"uuid": "13b926c1-91d6-4fe8-8f4e-23096372c8fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56255", "type": "seen", "source": "https://t.me/cvedetector/14126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56255 - AyeCode Connect Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56255 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Missing Authorization vulnerability in AyeCode AyeCode Connect allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AyeCode Connect: from n/a through 1.3.8. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:05.000000Z"}, {"uuid": "592c814b-e0cd-4a39-935a-11a0e1827339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56254", "type": "seen", "source": "https://t.me/cvedetector/14125", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56254 - Move Addons for Elementor Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56254 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:04.000000Z"}, {"uuid": "a30a5a9c-93cd-4b3a-9a59-01ec90a89ff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56256", "type": "seen", "source": "https://t.me/cvedetector/13986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56256 - Andy Fragen Embed PDF Viewer Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56256 \nPublished : Dec. 31, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andy Fragen Embed PDF Viewer allows Stored XSS.This issue affects Embed PDF Viewer: from n/a through 2.3.1. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T12:52:10.000000Z"}, {"uuid": "b5a45549-3274-4668-8b5c-c9fc112d085c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56253", "type": "seen", "source": "https://t.me/cvedetector/14131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56253 - Supsystic Data Tables Generator Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56253 \nPublished : Jan. 2, 2025, 12:15 p.m. | 36\u00a0minutes ago \nDescription : Missing Authorization vulnerability in supsystic.com Data Tables Generator by Supsystic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Data Tables Generator by Supsystic: from n/a through 1.10.36. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T14:15:12.000000Z"}, {"uuid": "5a4d4ebd-fec7-4926-97f4-ab2576bd3bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5625", "type": "seen", "source": "https://t.me/cvedetector/1171", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5625 - PruvaSoft Informatics Apinizer Management Console XML External Entity Reference Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-5625 \nPublished : July 18, 2024, 6:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Restriction of XML External Entity Reference vulnerability in PruvaSoft Informatics Apinizer Management Console allows Data Serialization External Entities Blowup.This issue affects Apinizer Management Console: before 2024.05.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T20:58:40.000000Z"}]}