{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T22:14:09.793","vulnerabilities":[{"cve":{"id":"CVE-2024-52371","sourceIdentifier":"audit@patchstack.com","published":"2024-11-14T18:15:21.383","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DonnellC Global Gateway e4 | Payeezy Gateway | globe-gateway-e4.This issue affects Global Gateway e4 | Payeezy Gateway |: from n/a through <= 2.0."},{"lang":"es","value":"Vulnerabilidad de limitación incorrecta de una ruta a un directorio restringido ('Path Traversal') en DonnellC Global Gateway e4 | Payeezy Gateway. Este problema afecta a Global Gateway e4 | Payeezy Gateway: desde n/a hasta 2.0."}],"metrics":{},"weaknesses":[{"source":"audit@patchstack.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://patchstack.com/database/Wordpress/Plugin/globe-gateway-e4/vulnerability/wordpress-global-gateway-e4-plugin-2-0-arbitrary-file-deletion-vulnerability?_s_id=cve","source":"audit@patchstack.com"}]}}]}