{"vulnerability": "CVE-2024-4836", "sightings": [{"uuid": "ebda778c-35b0-4571-8cbf-a666841b0a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}, {"uuid": "8cc95e0c-b7d0-44c9-bd0e-2611bdab2b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}, {"uuid": "c37ace29-acee-4e4e-a6a1-b36e8353cfe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "Telegram/XpvaFCWqDdhczMpL78DIu7UwbRt1BfqFLpK3OfazzKgSSlAyeg", "content": "", "creation_timestamp": "2024-08-31T12:29:12.000000Z"}, {"uuid": "787d347d-b9a6-4019-a823-92c79cc18b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "Telegram/3v_L1Km8kHglM99z9Gx-p2lsvnYIaRU3JVXDXxZhsRyM6xs7", "content": "", "creation_timestamp": "2024-08-31T12:42:28.000000Z"}, {"uuid": "4b38c588-b35c-402e-b8c8-7c591b4e249c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}, {"uuid": "5f35ac0d-3f38-4d2c-9bf2-83091cd991f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1580", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-31T13:09:22.000000Z"}, {"uuid": "2cff0d03-6bbb-4464-a8b5-90edfa97b636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}, {"uuid": "8f44c177-b696-4f63-b3dd-36e5cf4fb507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}, {"uuid": "d8a54025-f169-4372-9bca-031a666ba019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "753eb2dd-7093-4e72-bdf2-8ad6d7048fdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1554", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-30T06:52:02.000000Z"}, {"uuid": "500b4333-6a72-476e-9de4-462088700684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1520", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "b29c4ee2-31d5-49e5-b400-61e3f39eb741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}, {"uuid": "7efb6c0c-9f57-4df0-8817-4aada48e12a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7834", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aexamlpe poc of CVE-2024-4836_Check\nURL\uff1ahttps://github.com/sleep46/CVE-2024-4836_Check\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-02T17:20:58.000000Z"}, {"uuid": "a92f78c2-b879-4a96-b2dc-ed5a37a3de7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48360", "type": "seen", "source": "https://t.me/cvedetector/9535", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48360 - Qualitor Server-Side Request Forgery (SSRF)\", \n  \"Content\": \"CVE ID : CVE-2024-48360 \nPublished : Oct. 31, 2024, 8:15 p.m. | 37\u00a0minutes ago \nDescription : Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T21:57:42.000000Z"}, {"uuid": "ce2cddfa-168d-4117-902b-c4bbc1df0a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}, {"uuid": "3f60230b-79a1-46a9-8c87-c87612666a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/leak503/506", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-02T21:35:26.000000Z"}, {"uuid": "38af657f-a87b-4f1b-bf3c-80100ebabd5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4836", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}]}