{"vulnerability": "cve-2024-10508", "sightings": [{"uuid": "e4b702ba-c749-4e77-8a89-c0d6fd3da510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10508", "type": "seen", "source": "https://t.me/cvedetector/10286", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10508 - RegistrationMagic WordPress Auth Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-10508 \nPublished : Nov. 9, 2024, 8:15 a.m. | 39\u00a0minutes ago \nDescription : The RegistrationMagic \u2013 User Registration Plugin with Custom Registration Forms plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0.2.6. This is due to the plugin not properly validating the password reset token prior to updating a user's password. This makes it possible for unauthenticated attackers to reset the password of arbitrary users, including administrators, and gain access to these accounts. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T09:56:32.000000Z"}, {"uuid": "2faa0f37-6ce4-4293-9208-0241a81a1d99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10508", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/756", "content": "https://github.com/Jenderal92/CVE-2024-10508", "creation_timestamp": "2024-11-22T10:05:09.000000Z"}, {"uuid": "7ea30496-2040-45e4-acf7-c8226747ad92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10508", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/1595", "content": "https://github.com/Jenderal92/CVE-2024-10508", "creation_timestamp": "2024-12-02T01:56:49.000000Z"}, {"uuid": "8943432a-e9d4-48b6-b781-4c59ed7141af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10508", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113451845282995928", "content": "", "creation_timestamp": "2024-11-09T07:36:16.488824Z"}, {"uuid": "6d456f45-4b31-42fe-b42c-d474d85c2b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10508", "type": "seen", "source": "https://t.me/GithubRedTeam/9110", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPANW NGFW CVE-2024-0012\nURL\uff1ahttps://github.com/Jenderal92/CVE-2024-10508\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-21T04:36:37.000000Z"}]}