{"vulnerability": "cve-2024-32399", "sightings": [{"uuid": "4c3f0064-06bf-4650-a6ba-6ea5b4e82931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}, {"uuid": "bb3ac809-d867-467d-8731-554a3914893d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "seen", "source": "https://t.me/realLulzSec/1960", "content": "RaidenMAILD CVE-2024-32399\n\nGET /webeditor/../../../windows/win.ini HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-09-12T14:48:44.000000Z"}, {"uuid": "b5e63580-6e9b-4676-931d-8a1a9edcca81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}, {"uuid": "e6fad2ed-3042-409d-979f-c1f4224a179b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "seen", "source": "Telegram/z0NHFnlFdeP6ySyl3odlHomB7KrDHt8UwQoMNXCNRKnF2HE", "content": "", "creation_timestamp": "2024-09-12T15:29:18.000000Z"}, {"uuid": "c299a079-5a49-4fc2-9353-77621c46fc28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18592", "content": "RaidenMAILD CVE-2024-32399\n\nGET /webeditor/../../../windows/win.ini HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-09-13T11:40:07.000000Z"}, {"uuid": "26257099-56ae-479e-aa8d-da3383d02087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/leak503/506", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-02T21:35:26.000000Z"}, {"uuid": "66685bb3-a14a-42b9-890a-b6e6d79b96f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "Telegram/XpvaFCWqDdhczMpL78DIu7UwbRt1BfqFLpK3OfazzKgSSlAyeg", "content": "", "creation_timestamp": "2024-08-31T12:29:12.000000Z"}, {"uuid": "491d81ca-9f09-4c2a-ba28-33ea2cd5b5bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}, {"uuid": "bfc8b448-34e9-4de3-af85-31621fd27769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "Telegram/3v_L1Km8kHglM99z9Gx-p2lsvnYIaRU3JVXDXxZhsRyM6xs7", "content": "", "creation_timestamp": "2024-08-31T12:42:28.000000Z"}, {"uuid": "db96465b-a72b-45d0-9485-dfb721a0cbc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1554", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-30T06:52:02.000000Z"}, {"uuid": "5daba8a9-7090-4f9d-a6b1-e8757ec2fbdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}, {"uuid": "5d6e5912-0bba-4693-8382-4c4781cbb1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}, {"uuid": "11bd4922-0d92-4063-bca7-80579f417f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}, {"uuid": "3ab2a3e9-2ddf-4eb3-814c-077e25d52ae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}, {"uuid": "441072df-4028-4ae3-9bbc-298445055b61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1580", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-31T13:09:22.000000Z"}, {"uuid": "c8f64927-862d-4f0d-b50d-a9554ac53674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "32da2e53-3857-4221-aa8c-79ee812a7d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1520", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "f14fada0-3e3e-49f3-9f9e-921ef5f7f3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3158", "content": "RaidenMAILD CVE-2024-32399\n\nGET /webeditor/../../../windows/win.ini HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-09-12T14:46:02.000000Z"}, {"uuid": "02f8ae92-f5e4-4f00-9985-f1b17145b18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32399", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}]}