<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 13:01:31 +0000</lastBuildDate>
    <item>
      <title>d8a54025-f169-4372-9bca-031a666ba019</title>
      <link>https://db.gcve.eu/sighting/d8a54025-f169-4372-9bca-031a666ba019/export</link>
      <description>{"uuid": "d8a54025-f169-4372-9bca-031a666ba019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</description>
      <content:encoded>{"uuid": "d8a54025-f169-4372-9bca-031a666ba019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d8a54025-f169-4372-9bca-031a666ba019/export</guid>
      <pubDate>Sat, 07 Sep 2024 05:42:04 +0000</pubDate>
    </item>
    <item>
      <title>ce2cddfa-168d-4117-902b-c4bbc1df0a56</title>
      <link>https://db.gcve.eu/sighting/ce2cddfa-168d-4117-902b-c4bbc1df0a56/export</link>
      <description>{"uuid": "ce2cddfa-168d-4117-902b-c4bbc1df0a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}</description>
      <content:encoded>{"uuid": "ce2cddfa-168d-4117-902b-c4bbc1df0a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ce2cddfa-168d-4117-902b-c4bbc1df0a56/export</guid>
      <pubDate>Sat, 07 Sep 2024 16:14:23 +0000</pubDate>
    </item>
    <item>
      <title>8f44c177-b696-4f63-b3dd-36e5cf4fb507</title>
      <link>https://db.gcve.eu/sighting/8f44c177-b696-4f63-b3dd-36e5cf4fb507/export</link>
      <description>{"uuid": "8f44c177-b696-4f63-b3dd-36e5cf4fb507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}</description>
      <content:encoded>{"uuid": "8f44c177-b696-4f63-b3dd-36e5cf4fb507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8f44c177-b696-4f63-b3dd-36e5cf4fb507/export</guid>
      <pubDate>Fri, 13 Sep 2024 16:57:01 +0000</pubDate>
    </item>
    <item>
      <title>2cff0d03-6bbb-4464-a8b5-90edfa97b636</title>
      <link>https://db.gcve.eu/sighting/2cff0d03-6bbb-4464-a8b5-90edfa97b636/export</link>
      <description>{"uuid": "2cff0d03-6bbb-4464-a8b5-90edfa97b636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}</description>
      <content:encoded>{"uuid": "2cff0d03-6bbb-4464-a8b5-90edfa97b636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2cff0d03-6bbb-4464-a8b5-90edfa97b636/export</guid>
      <pubDate>Fri, 18 Oct 2024 12:25:41 +0000</pubDate>
    </item>
    <item>
      <title>4b38c588-b35c-402e-b8c8-7c591b4e249c</title>
      <link>https://db.gcve.eu/sighting/4b38c588-b35c-402e-b8c8-7c591b4e249c/export</link>
      <description>{"uuid": "4b38c588-b35c-402e-b8c8-7c591b4e249c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}</description>
      <content:encoded>{"uuid": "4b38c588-b35c-402e-b8c8-7c591b4e249c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4b38c588-b35c-402e-b8c8-7c591b4e249c/export</guid>
      <pubDate>Fri, 18 Oct 2024 12:26:48 +0000</pubDate>
    </item>
    <item>
      <title>a92f78c2-b879-4a96-b2dc-ed5a37a3de7f</title>
      <link>https://db.gcve.eu/sighting/a92f78c2-b879-4a96-b2dc-ed5a37a3de7f/export</link>
      <description>{"uuid": "a92f78c2-b879-4a96-b2dc-ed5a37a3de7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48360", "type": "seen", "source": "https://t.me/cvedetector/9535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48360 - Qualitor Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-48360 \nPublished : Oct. 31, 2024, 8:15 p.m. | 37\u00a0minutes ago \nDescription : Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T21:57:42.000000Z"}</description>
      <content:encoded>{"uuid": "a92f78c2-b879-4a96-b2dc-ed5a37a3de7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48360", "type": "seen", "source": "https://t.me/cvedetector/9535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48360 - Qualitor Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-48360 \nPublished : Oct. 31, 2024, 8:15 p.m. | 37\u00a0minutes ago \nDescription : Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T21:57:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a92f78c2-b879-4a96-b2dc-ed5a37a3de7f/export</guid>
      <pubDate>Thu, 31 Oct 2024 21:57:42 +0000</pubDate>
    </item>
    <item>
      <title>b29c4ee2-31d5-49e5-b400-61e3f39eb741</title>
      <link>https://db.gcve.eu/sighting/b29c4ee2-31d5-49e5-b400-61e3f39eb741/export</link>
      <description>{"uuid": "b29c4ee2-31d5-49e5-b400-61e3f39eb741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}</description>
      <content:encoded>{"uuid": "b29c4ee2-31d5-49e5-b400-61e3f39eb741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b29c4ee2-31d5-49e5-b400-61e3f39eb741/export</guid>
      <pubDate>Tue, 12 Nov 2024 20:45:56 +0000</pubDate>
    </item>
    <item>
      <title>8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a</title>
      <link>https://db.gcve.eu/sighting/8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a/export</link>
      <description>{"uuid": "8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}</description>
      <content:encoded>{"uuid": "8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a/export</guid>
      <pubDate>Sat, 30 Nov 2024 13:27:14 +0000</pubDate>
    </item>
    <item>
      <title>38af657f-a87b-4f1b-bf3c-80100ebabd5a</title>
      <link>https://db.gcve.eu/sighting/38af657f-a87b-4f1b-bf3c-80100ebabd5a/export</link>
      <description>{"uuid": "38af657f-a87b-4f1b-bf3c-80100ebabd5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}</description>
      <content:encoded>{"uuid": "38af657f-a87b-4f1b-bf3c-80100ebabd5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/38af657f-a87b-4f1b-bf3c-80100ebabd5a/export</guid>
      <pubDate>Wed, 18 Dec 2024 18:01:34 +0000</pubDate>
    </item>
    <item>
      <title>ebda778c-35b0-4571-8cbf-a666841b0a41</title>
      <link>https://db.gcve.eu/sighting/ebda778c-35b0-4571-8cbf-a666841b0a41/export</link>
      <description>{"uuid": "ebda778c-35b0-4571-8cbf-a666841b0a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}</description>
      <content:encoded>{"uuid": "ebda778c-35b0-4571-8cbf-a666841b0a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ebda778c-35b0-4571-8cbf-a666841b0a41/export</guid>
      <pubDate>Sun, 16 Mar 2025 00:41:48 +0000</pubDate>
    </item>
  </channel>
</rss>
