{"vulnerability": "CVE-2024-5326", "sightings": [{"uuid": "26bf48d7-1d5b-4d8d-84db-94967676f040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947708437450296", "content": "", "creation_timestamp": "2025-02-04T21:20:48.457475Z"}, {"uuid": "a1e1fa86-7f08-4834-91a6-fba04b5cdb30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf3hphkne2j", "content": "", "creation_timestamp": "2025-02-04T22:16:14.213709Z"}, {"uuid": "4f79b93a-5135-470c-8ac6-35b6767238a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgvfcg2g", "content": "", "creation_timestamp": "2025-02-05T02:23:50.670524Z"}, {"uuid": "9d25febb-0003-4fa5-ba79-d5f45441f9d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lgsvanwiok2v", "content": "", "creation_timestamp": "2025-01-28T16:37:00.514712Z"}, {"uuid": "d11876c5-c0c4-4522-8941-a5063ddcf415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7485", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-5326 Post Grid Gutenberg Blocks and WordPress Blog Plugin \u2013 PostX &lt;= 4.1.2 - Missing Authorization to Arbitrary Options Update\nURL\uff1ahttps://github.com/truonghuuphuc/CVE-2024-5326-Poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-01T04:30:12.000000Z"}, {"uuid": "b439b741-1292-4f62-bec2-f9287c1da90d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/investigationAnonYmous1/10822", "content": "CVE-2024-5326 WordPress \n\nPost Grid Gutenberg - PostX plugin = 4.1.2\n\u064a\u062a\u064a\u062d User Contributor \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0648\u062a\u0639\u064a\u064a\u0646 \u0627\u0644\u062f\u0648\u0631 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0644\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0625\u0644\u0649 \u0627\u0644\u0645\u0633\u0624\u0648\u0644 .\n\nexploit  POC \nURL- investigationAnonYmous \n\n#wordpress #exploit", "creation_timestamp": "2025-05-06T15:29:12.000000Z"}, {"uuid": "5ab69017-9fe5-4cad-a109-e504f41d49dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://t.me/cvedetector/15368", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53263 - Git LFS Remote Code Execution via CRLF Injection\", \n  \"Content\": \"CVE ID : CVE-2024-53263 \nPublished : Jan. 14, 2025, 8:15 p.m. | 37\u00a0minutes ago \nDescription : Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T22:23:01.000000Z"}, {"uuid": "b1121ee9-1970-449a-bcd9-b06f17f5a183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "Telegram/Xf-OZTZ1qSXbTWHr-O3gplBCRCw1cGfJ6CVi9zCL3nwA1hI", "content": "", "creation_timestamp": "2024-08-22T10:54:43.000000Z"}, {"uuid": "f714f436-8666-4d85-8a6d-546543b013d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2109", "content": "CVE-2024-5326 WordPress \n*\nPost Grid Gutenberg \u0438 \u043f\u043b\u0430\u0433\u0438\u043d PostX = 4.1.2\nUser Contributor \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u044e \u043d\u043e\u0432\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0440\u043e\u043b\u044c \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0434\u043b\u044f \u043d\u043e\u0432\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u2014 \u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440.\n*\nPOC exploit\n\n#wordpress #exploit", "creation_timestamp": "2024-06-05T10:47:34.000000Z"}, {"uuid": "0f5d519c-86cf-47b7-be09-d462e695cbe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://t.me/thehackernews/6235", "content": "\ud83d\udea8 Alert \u2014 GitHub Desktop &amp; GitHub projects have critical vulnerabilities that can expose your credentials to attackers.\n\n\ud83d\udd11 CVE-2024-53263 \u2013 Git LFS leaks credentials via crafted URLs.\n\u26a1 CVE-2024-50338 \u2013 GitHub CLI sends tokens to attacker-controlled hosts.\n\nAttackers can use this to gain unauthorized access to your private repositories.\n\n\ud83d\udd17 Read full details: https://thehackernews.com/2025/01/github-desktop-vulnerability-risks.html", "creation_timestamp": "2025-01-27T15:21:54.000000Z"}, {"uuid": "2fc31656-a39b-4c90-a765-83fa6b431cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53264", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113556417023556349", "content": "", "creation_timestamp": "2024-11-27T18:50:14.499781Z"}, {"uuid": "6d0b6e72-3d5a-42da-aa6c-95ae96c61f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53261", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113545203266583667", "content": "", "creation_timestamp": "2024-11-25T19:18:26.212617Z"}, {"uuid": "9c208c21-b8ce-427e-af91-26448d6f481e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53269", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113675507912279037", "content": "", "creation_timestamp": "2024-12-18T19:36:37.317118Z"}, {"uuid": "23fed609-76cf-4787-98bb-d16f3f47f074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "8018773b-7eb0-48cf-b83e-276063d18e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://t.me/cvedetector/17246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53266 - Discourse Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-53266 \nPublished : Feb. 4, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:46.000000Z"}, {"uuid": "fe66598e-d3f5-47a5-a0de-45ef79d92ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53269", "type": "seen", "source": "https://t.me/cvedetector/13239", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53269 - Envoy Happy Eyeballs Algorithm Crash in Data Plane\", \n  \"Content\": \"CVE ID : CVE-2024-53269 \nPublished : Dec. 18, 2024, 8:15 p.m. | 36\u00a0minutes ago \nDescription : Envoy is a cloud-native high-performance edge/middle/service proxy. When additional address are not ip addresses, then the Happy Eyeballs sorting algorithm will crash in data plane. This issue has been addressed in releases 1.32.2, 1.31.4, and 1.30.8. Users are advised to upgrade. Users unable to upgrade may disable Happy Eyeballs and/or change the IP configuration. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T22:03:47.000000Z"}, {"uuid": "02231dce-c71a-4b7e-9d41-292fd01b0f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "Telegram/wIMVT3ZwRbEJB4qBw--6F1wYXiU9VboC9xd0aju548qhucI", "content": "", "creation_timestamp": "2024-07-01T07:14:04.000000Z"}, {"uuid": "295e3e8c-ab2c-4a87-ab23-6ba4d8b3f2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10628", "content": "#exploit\n1. CVE-2024-4985:\nGitHub enterprise server auth bypass\nhttps://github.com/absholi7ly/Bypass-authentication-GitHub-Enterprise-Server\n\n2. CVE-2024-5326:\nPost Grid Gutenberg Blocks and WordPress Blog Plugin - PostX &lt;=4.1.2 - Missing Authorization to Arbitrary Options Update\nhttps://github.com/truonghuuphuc/CVE-2024-5326-Poc", "creation_timestamp": "2024-06-06T11:52:57.000000Z"}, {"uuid": "b18fe2ea-25cb-475d-9308-697f0dd16317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53268", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113545237501595850", "content": "", "creation_timestamp": "2024-11-25T19:27:08.758508Z"}, {"uuid": "a222aa08-acbd-4460-bb1c-af489d25f9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53260", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113557057129821106", "content": "", "creation_timestamp": "2024-11-27T21:33:02.836148Z"}, {"uuid": "d8ce379c-6b5c-49ef-af74-4c2e45436b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://github.blog/open-source/git/git-security-vulnerabilities-announced-5/", "content": "", "creation_timestamp": "2025-01-14T17:04:36.000000Z"}, {"uuid": "430ca422-dde1-4198-bce3-2a1a4e7600b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfq2x5e4kp2f", "content": "", "creation_timestamp": "2025-01-14T20:15:51.765659Z"}, {"uuid": "1444b14e-b3e3-4c19-9468-13e2063caf7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/catra.top/post/3likm72m3o223", "content": "", "creation_timestamp": "2025-02-19T20:24:23.340067Z"}, {"uuid": "2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3mddymicpvb42", "content": "", "creation_timestamp": "2026-01-26T19:38:04.090342Z"}, {"uuid": "082d58b0-0e38-4d1f-8302-e23cfe27eeba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1767", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53263\n\ud83d\udd39 Description: Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.\n\ud83d\udccf Published: 2025-01-14T19:33:21.876Z\n\ud83d\udccf Modified: 2025-01-15T14:55:48.695Z\n\ud83d\udd17 References:\n1. https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7\n2. https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90\n3. https://github.com/git-lfs/git-lfs/releases/tag/v3.6.1", "creation_timestamp": "2025-01-15T15:10:43.000000Z"}, {"uuid": "1679c39e-10c1-41cb-a342-44a9bccacf0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "Telegram/2jkVbon0AKvDKm9vj_F7rnMeTxCzgQeChMbLUtudeUZLIg", "content": "", "creation_timestamp": "2025-01-28T11:57:13.000000Z"}, {"uuid": "6763e03f-599e-49b1-8e4f-54b656a33be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/893", "content": "https://github.com/truonghuuphuc/CVE-2024-5326-Poc\n\nCVE-2024-5326\n#github #poc", "creation_timestamp": "2024-06-01T11:57:06.000000Z"}, {"uuid": "6559950e-5778-4810-ab69-8bd1914fbef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2572", "content": "https://github.com/truonghuuphuc/CVE-2024-5326-Poc\n\nCVE-2024-5326\n#github #poc", "creation_timestamp": "2024-06-02T12:12:29.000000Z"}, {"uuid": "a81d42ad-ac83-4327-9f21-c4be9ba1b681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53262", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113545203299807277", "content": "", "creation_timestamp": "2024-11-25T19:18:26.723344Z"}]}