<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 13:01:31 +0000</lastBuildDate>
    <item>
      <title>aebf1448-1393-48c4-90be-6f2992f20288</title>
      <link>https://db.gcve.eu/sighting/aebf1448-1393-48c4-90be-6f2992f20288/export</link>
      <description>{"uuid": "aebf1448-1393-48c4-90be-6f2992f20288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1520", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</description>
      <content:encoded>{"uuid": "aebf1448-1393-48c4-90be-6f2992f20288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1520", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aebf1448-1393-48c4-90be-6f2992f20288/export</guid>
      <pubDate>Sat, 07 Sep 2024 05:42:04 +0000</pubDate>
    </item>
    <item>
      <title>9c7e1c8f-0d8a-4031-9c69-9ffc6ffda40c</title>
      <link>https://db.gcve.eu/sighting/9c7e1c8f-0d8a-4031-9c69-9ffc6ffda40c/export</link>
      <description>{"uuid": "9c7e1c8f-0d8a-4031-9c69-9ffc6ffda40c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</description>
      <content:encoded>{"uuid": "9c7e1c8f-0d8a-4031-9c69-9ffc6ffda40c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9c7e1c8f-0d8a-4031-9c69-9ffc6ffda40c/export</guid>
      <pubDate>Sat, 07 Sep 2024 05:42:04 +0000</pubDate>
    </item>
    <item>
      <title>b7f32cb0-7638-4eea-8959-bc7f1e42052b</title>
      <link>https://db.gcve.eu/sighting/b7f32cb0-7638-4eea-8959-bc7f1e42052b/export</link>
      <description>{"uuid": "b7f32cb0-7638-4eea-8959-bc7f1e42052b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}</description>
      <content:encoded>{"uuid": "b7f32cb0-7638-4eea-8959-bc7f1e42052b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7f32cb0-7638-4eea-8959-bc7f1e42052b/export</guid>
      <pubDate>Sat, 07 Sep 2024 16:14:23 +0000</pubDate>
    </item>
    <item>
      <title>e0cae484-4d05-4357-87a4-4c728b335916</title>
      <link>https://db.gcve.eu/sighting/e0cae484-4d05-4357-87a4-4c728b335916/export</link>
      <description>{"uuid": "e0cae484-4d05-4357-87a4-4c728b335916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}</description>
      <content:encoded>{"uuid": "e0cae484-4d05-4357-87a4-4c728b335916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e0cae484-4d05-4357-87a4-4c728b335916/export</guid>
      <pubDate>Fri, 13 Sep 2024 16:57:01 +0000</pubDate>
    </item>
    <item>
      <title>6fb35d50-add3-401d-af98-de19319f6c03</title>
      <link>https://db.gcve.eu/sighting/6fb35d50-add3-401d-af98-de19319f6c03/export</link>
      <description>{"uuid": "6fb35d50-add3-401d-af98-de19319f6c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}</description>
      <content:encoded>{"uuid": "6fb35d50-add3-401d-af98-de19319f6c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6fb35d50-add3-401d-af98-de19319f6c03/export</guid>
      <pubDate>Fri, 18 Oct 2024 12:25:41 +0000</pubDate>
    </item>
    <item>
      <title>ceae7b62-a9e6-48ce-8353-1ab4e5502d08</title>
      <link>https://db.gcve.eu/sighting/ceae7b62-a9e6-48ce-8353-1ab4e5502d08/export</link>
      <description>{"uuid": "ceae7b62-a9e6-48ce-8353-1ab4e5502d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}</description>
      <content:encoded>{"uuid": "ceae7b62-a9e6-48ce-8353-1ab4e5502d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ceae7b62-a9e6-48ce-8353-1ab4e5502d08/export</guid>
      <pubDate>Fri, 18 Oct 2024 12:26:48 +0000</pubDate>
    </item>
    <item>
      <title>b535c13f-f31b-4fbd-9e68-cea39e7b7500</title>
      <link>https://db.gcve.eu/sighting/b535c13f-f31b-4fbd-9e68-cea39e7b7500/export</link>
      <description>{"uuid": "b535c13f-f31b-4fbd-9e68-cea39e7b7500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}</description>
      <content:encoded>{"uuid": "b535c13f-f31b-4fbd-9e68-cea39e7b7500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b535c13f-f31b-4fbd-9e68-cea39e7b7500/export</guid>
      <pubDate>Tue, 12 Nov 2024 20:45:56 +0000</pubDate>
    </item>
    <item>
      <title>5ee1ae33-7544-4769-a0fc-20ad8a9e671f</title>
      <link>https://db.gcve.eu/sighting/5ee1ae33-7544-4769-a0fc-20ad8a9e671f/export</link>
      <description>{"uuid": "5ee1ae33-7544-4769-a0fc-20ad8a9e671f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}</description>
      <content:encoded>{"uuid": "5ee1ae33-7544-4769-a0fc-20ad8a9e671f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5ee1ae33-7544-4769-a0fc-20ad8a9e671f/export</guid>
      <pubDate>Sat, 30 Nov 2024 13:27:14 +0000</pubDate>
    </item>
    <item>
      <title>58b3572a-b03a-44fb-90c7-2fc9bff66d3f</title>
      <link>https://db.gcve.eu/sighting/58b3572a-b03a-44fb-90c7-2fc9bff66d3f/export</link>
      <description>{"uuid": "58b3572a-b03a-44fb-90c7-2fc9bff66d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}</description>
      <content:encoded>{"uuid": "58b3572a-b03a-44fb-90c7-2fc9bff66d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/58b3572a-b03a-44fb-90c7-2fc9bff66d3f/export</guid>
      <pubDate>Wed, 18 Dec 2024 18:01:34 +0000</pubDate>
    </item>
    <item>
      <title>d6164ed5-57c9-4c47-8cca-3d0b624d4ed5</title>
      <link>https://db.gcve.eu/sighting/d6164ed5-57c9-4c47-8cca-3d0b624d4ed5/export</link>
      <description>{"uuid": "d6164ed5-57c9-4c47-8cca-3d0b624d4ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}</description>
      <content:encoded>{"uuid": "d6164ed5-57c9-4c47-8cca-3d0b624d4ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6313", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&amp;gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &amp;lt; Unauthenticated Information Exposure.\n\n2x =&amp;gt; CVE-2024-38759 - Wordpress [Search &amp;amp; Replace] &amp;lt; Unauthenticated PHP Object Injection.\n\n3x =&amp;gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &amp;lt; Unauthenticated Arbitrary File Upload.\n\n4x =&amp;gt; CVE-2024-6164 - Wordpress [Filter &amp;amp; Grids] &amp;lt; Unauthenticated Local File Inclusion.\n\n5x =&amp;gt; CVE-2024-40348 - \n[Bazarr] &amp;lt; Unauthenticated Arbitrary File Read.\n\n6x =&amp;gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &amp;lt; Unauthenticated SQL Injection via Hash.\n\n7x =&amp;gt; CVE-2024-4577 - PHP [CGI] &amp;lt; Unauthenticated Command Injection.\n\n8x =&amp;gt; CVE-2024-4836 - [Edito CMS] &amp;lt; Unauthenticated Sensitive Data Leak.\n\n9x =&amp;gt; CVE-2024-32399 - RaidenMAILD [MailServer] &amp;lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d6164ed5-57c9-4c47-8cca-3d0b624d4ed5/export</guid>
      <pubDate>Sun, 16 Mar 2025 00:41:48 +0000</pubDate>
    </item>
  </channel>
</rss>
