{"vulnerability": "cve-2024-1368", "sightings": [{"uuid": "5596e15a-91ea-41fd-88be-a8034649e922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1368", "type": "seen", "source": "https://t.me/ctinow/208174", "content": "https://ift.tt/t5APblq\nCVE-2024-1368 | Page Duplicator Plugin up to 0.1.1 on WordPress authorization", "creation_timestamp": "2024-03-14T21:27:04.000000Z"}, {"uuid": "70a830c1-6829-4f8e-81ac-113a0eb78c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13682", "type": "seen", "source": "https://t.me/cvedetector/19492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13682 - WooCommerce Wallet CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13682 \nPublished : March 4, 2025, 9:15 a.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : The Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.2. This is due to missing or incorrect nonce validation in class-wallet-user-table.php. This makes it possible for unauthenticated attackers to modify wallet balances via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T12:30:10.000000Z"}, {"uuid": "06325d8c-a1fd-4e98-b987-7ad74f697394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13681", "type": "seen", "source": "https://t.me/cvedetector/18316", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13681 - Uncode Theme for WordPress File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13681 \nPublished : Feb. 18, 2025, 11:15 a.m. | 18\u00a0minutes ago \nDescription : The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_admin_get_oembed' function in all versions up to, and including, 2.9.1.6. This makes it possible for unauthenticated attackers to read arbitrary files on the server. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T12:38:03.000000Z"}, {"uuid": "57e1c6f9-49a0-4948-8553-270e26bbcc83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13687", "type": "seen", "source": "https://t.me/cvedetector/18284", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13687 - WordPress Team Builder Plugin Unauthenticated Data Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13687 \nPublished : Feb. 18, 2025, 5:15 a.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The Team Builder \u2013 Meet the Team plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_team_builder_options() function in all versions up to, and including, 1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T09:16:56.000000Z"}, {"uuid": "a6afa811-ec3e-4599-96ca-af93378134ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13683", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2883", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13683\n\ud83d\udd39 Description: The Automate Hub Free by Sperse.IO plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.0. This is due to missing or incorrect nonce validation on the 'automate_hub' page. This makes it possible for unauthenticated attackers to update an activation status via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-24T07:04:09.519Z\n\ud83d\udccf Modified: 2025-01-24T07:04:09.519Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f6d90ca3-dc24-4634-9f98-83a909e3e093?source=cve\n2. https://wordpress.org/plugins/automate-hub-free-by-sperse-io/\n3. https://plugins.trac.wordpress.org/browser/automate-hub-free-by-sperse-io/trunk/apps/s/sperse/sperse.php#L141", "creation_timestamp": "2025-01-24T08:03:57.000000Z"}, {"uuid": "bbbf6557-695b-4a33-8575-cffb35422532", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13680", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13680\n\ud83d\udd39 Description: The Form Builder CP plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'CP_EASY_FORM_WILL_APPEAR_HERE' shortcode in all versions up to, and including, 1.2.41 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n\ud83d\udccf Published: 2025-01-24T07:04:08.504Z\n\ud83d\udccf Modified: 2025-01-24T07:04:08.504Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a018fcb1-b7a6-456f-ab0b-59ccc1fd5b67?source=cve\n2. https://plugins.trac.wordpress.org/browser/cp-easy-form-builder/tags/1.2.41/cp_easy_form_builder.php#L297\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3214984%40cp-easy-form-builder&amp;new=3214984%40cp-easy-form-builder&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-01-24T08:03:57.000000Z"}, {"uuid": "11b9204e-0cc6-4cdc-ae74-14b8024a0dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13685", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6345", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13685\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10.\n\ud83d\udccf Published: 2025-03-04T06:00:04.054Z\n\ud83d\udccf Modified: 2025-03-04T06:00:04.054Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/72c61904-253d-42d1-9edd-7ea2162a2f85/", "creation_timestamp": "2025-03-04T06:30:47.000000Z"}, {"uuid": "ad2814af-a534-4bd8-b043-4adedf5d3cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13682", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6363", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13682\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Wallet System for WooCommerce \u2013 Wallet, Wallet Cashback, Refunds, Partial Payment, Wallet Restriction plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.2. This is due to missing or incorrect nonce validation in class-wallet-user-table.php. This makes it possible for unauthenticated attackers to modify wallet balances via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-03-04T08:23:40.786Z\n\ud83d\udccf Modified: 2025-03-04T08:23:40.786Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/779a9f7a-4582-4d5e-bd9a-9ff7f14b452a?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;new=3244479%40wallet-system-for-woocommerce%2Ftrunk&amp;old=3231275%40wallet-system-for-woocommerce%2Ftrunk&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-03-04T09:32:02.000000Z"}, {"uuid": "aa626cd2-66d3-44fb-90f1-1a01ec43b8ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13686", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6381", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13686\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The VW Storefront theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vw_storefront_reset_all_settings() function in all versions up to, and including, 0.9.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the themes settings.\n\ud83d\udccf Published: 2025-03-04T03:37:58.615Z\n\ud83d\udccf Modified: 2025-03-04T16:27:02.834Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/299ed515-ba64-413a-a03a-2db801520ae0?source=cve\n2. https://themes.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=261535%40vw-storefront&amp;new=261535%40vw-storefront&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-03-04T16:31:41.000000Z"}, {"uuid": "83dc3c85-c51e-4365-9282-46275dc60e51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13680", "type": "seen", "source": "https://t.me/cvedetector/16253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13680 - WordPress Form Builder CP SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-13680 \nPublished : Jan. 24, 2025, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The Form Builder CP plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'CP_EASY_FORM_WILL_APPEAR_HERE' shortcode in all versions up to, and including, 1.2.41 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T09:23:03.000000Z"}, {"uuid": "840b16dc-53f9-4ba7-86d2-4e2a5424e70a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13683", "type": "seen", "source": "https://t.me/cvedetector/16252", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13683 - \"Sperse.IO Automate Hub Cross-Site Request Forgery\"\", \n  \"Content\": \"CVE ID : CVE-2024-13683 \nPublished : Jan. 24, 2025, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The Automate Hub Free by Sperse.IO plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.0. This is due to missing or incorrect nonce validation on the 'automate_hub' page. This makes it possible for unauthenticated attackers to update an activation status via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T09:23:03.000000Z"}, {"uuid": "6e7a1342-316d-481c-826d-b33ed251e6e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13687", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ligzikirng26", "content": "", "creation_timestamp": "2025-02-18T10:11:25.976786Z"}, {"uuid": "aff5cada-13d0-4e7d-941e-f1bce8ebce05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13681", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lih53ondwh2n", "content": "", "creation_timestamp": "2025-02-18T11:15:48.861535Z"}, {"uuid": "6194bd71-ffc9-4f93-91e0-a46b605e1d45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13689", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihkmhqvuq2p", "content": "", "creation_timestamp": "2025-02-18T15:17:50.990314Z"}, {"uuid": "434eaf62-7ddf-436c-9970-645bc9babc89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13689", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lihtherg6q2e", "content": "", "creation_timestamp": "2025-02-18T17:56:04.359725Z"}, {"uuid": "b081dd4e-c18a-40d4-af2d-baa983c9a904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13688", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnuhxieo5u2b", "content": "", "creation_timestamp": "2025-04-28T09:40:54.469442Z"}, {"uuid": "64cb2e86-7766-4464-8596-251e806917e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13684", "type": "seen", "source": "https://t.me/cvedetector/18283", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13684 - WordPress Reset Plugin Cross-Site Request Forgery (CSRF) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13684 \nPublished : Feb. 18, 2025, 5:15 a.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the reset_db_page() function. This makes it possible for unauthenticated attackers to reset several tables in the database like comments, themes, plugins, and more via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T09:16:52.000000Z"}, {"uuid": "ed30dc35-5965-4a77-8e89-25969ffe36e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13687", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13687\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Team Builder \u2013 Meet the Team plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_team_builder_options() function in all versions up to, and including, 1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.\n\ud83d\udccf Published: 2025-02-18T04:21:18.316Z\n\ud83d\udccf Modified: 2025-02-18T04:21:18.316Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/7c35e20f-bfb0-4de0-9f8f-6e04fbbe138a?source=cve\n2. https://plugins.trac.wordpress.org/browser/team-display/tags/1.3/plugin.class.php#L34", "creation_timestamp": "2025-02-18T07:56:49.000000Z"}, {"uuid": "6df97079-3162-4f93-be50-2bfd10661db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13688", "type": "seen", "source": "https://t.me/cvedetector/23887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13688 - WordPress ASE Password Protection Hardcoded Password Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-13688 \nPublished : April 28, 2025, 6:15 a.m. | 51\u00a0minutes ago \nDescription : The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T09:52:50.000000Z"}, {"uuid": "88f99613-c46c-4190-ab1b-7b3669d3c457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13684", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ligizyipmn2o", "content": "", "creation_timestamp": "2025-02-18T05:16:57.352832Z"}, {"uuid": "e2be7c92-3b75-405b-af3f-997b26e4733f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13687", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ligj22rkm42t", "content": "", "creation_timestamp": "2025-02-18T05:16:59.520350Z"}, {"uuid": "639e3916-c833-4bb5-b066-12de9b232b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13684", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ligm2xre7c2z", "content": "", "creation_timestamp": "2025-02-18T06:11:12.322567Z"}, {"uuid": "08f69c0e-904f-49ef-ae0a-bf4d0c54efff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13684", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114023552622562906", "content": "", "creation_timestamp": "2025-02-18T06:48:58.268103Z"}, {"uuid": "bed49cea-0850-4c22-9f26-443d3bb69ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13685", "type": "seen", "source": "https://t.me/cvedetector/19469", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13685 - WordPress Admin and Site Enhancements (ASE) IP Address Manipulation Vulnerability (Information Disclosure/Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2024-13685 \nPublished : March 4, 2025, 6:15 a.m. | 23\u00a0minutes ago \nDescription : The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T08:18:30.000000Z"}, {"uuid": "53863ffb-0616-49c1-afbb-5edb40517943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13689", "type": "seen", "source": "https://t.me/cvedetector/18331", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13689 - Uncode Core Plugin WordPress Shortcode Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13689 \nPublished : Feb. 18, 2025, 3:15 p.m. | 29\u00a0minutes ago \nDescription : The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T16:49:01.000000Z"}, {"uuid": "5ff49e66-1a25-416a-b334-ed0aac5975ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1368", "type": "seen", "source": "Telegram/3jW098M2-8OSWyGLuQA0MsMCa_fetnLjTcLnOy0GvMDARmQf", "content": "", "creation_timestamp": "2025-02-14T10:04:00.000000Z"}]}