{"uuid": "1c3cb003-b467-4b0d-a9b7-d856ed450612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "seen", "source": "https://t.me/h0rn3t_sp1d3rs/494", "content": "\u2668\ufe0f YOU NEED ? \n\n\u2705 Advanced software to exploit cve-2024 vulnerabilities.\n\n\u27a1\ufe0f CVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE] \n\n\u27a1\ufe0f CVE-2024-1210 -\u00a0 Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE] \n\n\u27a1\ufe0f CVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC] \n\n\u27a1\ufe0f CVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW] \n \n\ud83d\uded2 Dm @h0rn3t_sp1d3r \u2708\ufe0f", "creation_timestamp": "2024-03-18T19:56:23.000000Z"}