{"vulnerability": "CVE-2024-0713", "sightings": [{"uuid": "3bcbe72c-4ca5-46ea-86f9-dd027c9571e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "Telegram/eU5TW0NrIabaH627FpFKhEBuxk5i4RkIq4T6rxIMq7cGCQ", "content": "", "creation_timestamp": "2025-03-05T22:29:05.000000Z"}, {"uuid": "5ae66079-7eef-47ab-947a-4671777c4d3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/bexsop/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-14T13:46:34.000000Z"}, {"uuid": "60a5ea24-a75f-4fd3-8a6c-80b96131d657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/42136", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-16T15:10:16.000000Z"}, {"uuid": "8e32ced6-8608-4d70-9d4e-591594c1ca8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "Telegram/5wtuBUawfmBgpqWWV5EHlsYg0fOU3PzyjHe2qzgYk5w-", "content": "", "creation_timestamp": "2024-06-14T14:38:05.000000Z"}, {"uuid": "2235ac1f-6215-4fdb-bd0f-deba2cb8b2d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/12981", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-16T15:10:15.000000Z"}, {"uuid": "be469e88-ea02-41d1-8dc8-74612522eac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/324", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-03-22T20:01:24.000000Z"}, {"uuid": "3c562dc1-b7c1-41db-9656-48409c638088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/313", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-02-26T20:19:03.000000Z"}, {"uuid": "56a9865c-9a92-42c4-b0b6-455065470989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1457", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:50.000000Z"}, {"uuid": "3b452458-b1cc-40ac-ac2c-df5efb281fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1397", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-03-19T16:05:55.000000Z"}, {"uuid": "42057b49-8989-4899-8c29-32611d4da26e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1444", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:51.000000Z"}, {"uuid": "84edbd09-f5b0-4b2d-acad-3f4785b21a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1404", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-03T19:16:45.000000Z"}, {"uuid": "2f538138-fbbd-47d3-ab2a-2a263a205ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1425", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-27T16:50:04.000000Z"}, {"uuid": "63c6d0e8-6f4d-419d-ae94-ca8803d12774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1380", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-02-23T22:03:27.000000Z"}, {"uuid": "edd5eb62-3153-4fb6-8be2-b785661dbde0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1122", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2025-03-05T14:04:07.000000Z"}, {"uuid": "6fedad2a-9f72-435f-8d26-078a549b4838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "seen", "source": "https://t.me/arpsyndicate/2980", "content": "#ExploitObserverAlert\n\nCVE-2024-0713\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0713. A vulnerability was found in Monitorr 1.7.6m. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assets/php/upload.php of the component Services Configuration. The manipulation of the argument fileToUpload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251539. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-01-26T15:15:31.000000Z"}, {"uuid": "41b794c8-2560-4228-8b12-c461d851401f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "seen", "source": "https://t.me/ctinow/185293", "content": "https://ift.tt/C4pJzdo\nCVE-2024-0713 | Monitorr 1.7.6m Services Configuration /assets/php/upload.php fileToUpload unrestricted upload", "creation_timestamp": "2024-02-15T07:41:30.000000Z"}, {"uuid": "5a28f231-9b1e-411a-bcb0-880a005eafb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/4049", "content": "\u2620\ufe0fCVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\n\u2708\ufe0fEnjoy", "creation_timestamp": "2025-03-05T23:29:05.000000Z"}, {"uuid": "1c3cb003-b467-4b0d-a9b7-d856ed450612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "seen", "source": "https://t.me/h0rn3t_sp1d3rs/494", "content": "\u2668\ufe0f YOU NEED ? \n\n\u2705 Advanced software to exploit cve-2024 vulnerabilities.\n\n\u27a1\ufe0f CVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE] \n\n\u27a1\ufe0f CVE-2024-1210 -\u00a0 Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE] \n\n\u27a1\ufe0f CVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC] \n\n\u27a1\ufe0f CVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW] \n \n\ud83d\uded2 Dm @h0rn3t_sp1d3r \u2708\ufe0f", "creation_timestamp": "2024-03-18T19:56:23.000000Z"}, {"uuid": "d040a7ce-3834-45ff-b9d9-17063145428b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1412", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-05-14T19:38:14.000000Z"}, {"uuid": "ea1bfb27-051e-44e3-bf3d-1f10d20d7120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1625", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T11:01:27.000000Z"}, {"uuid": "85425967-2b63-40f0-b9e8-504e1f7e3b66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "seen", "source": "https://t.me/ctinow/174449", "content": "https://ift.tt/6iV9Oms\nCVE-2024-0713 Exploit", "creation_timestamp": "2024-01-26T20:16:29.000000Z"}, {"uuid": "2591beb0-3527-48de-96ab-f6bad8bbe7fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0713", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T22:32:26.000000Z"}]}