{"vulnerability": "cve-2024-6164", "sightings": [{"uuid": "0e6405a0-5d97-4634-aeb9-eb3254cdb1e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "Telegram/XpvaFCWqDdhczMpL78DIu7UwbRt1BfqFLpK3OfazzKgSSlAyeg", "content": "", "creation_timestamp": "2024-08-31T12:29:12.000000Z"}, {"uuid": "ca210ca0-2d6e-412b-b5a5-80518a92f462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "Telegram/3v_L1Km8kHglM99z9Gx-p2lsvnYIaRU3JVXDXxZhsRyM6xs7", "content": "", "creation_timestamp": "2024-08-31T12:42:28.000000Z"}, {"uuid": "451af162-ec50-41f5-bed5-6ce9b6d7bc2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "Telegram/74IzvRfHv6As3hyVMCWy5rx44qm1MKm9hZLdVsqv0WV9bgP1", "content": "", "creation_timestamp": "2024-10-18T12:26:48.000000Z"}, {"uuid": "6d680dc4-ee6d-45da-abf0-af40af8e7064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1580", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-31T13:09:22.000000Z"}, {"uuid": "a21ab466-18f9-46a9-9b34-d48fdb947adc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1653", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-12-18T18:01:34.000000Z"}, {"uuid": "dffc5665-2e33-473c-b4be-ee0eec5e0e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1634", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-11-30T13:27:14.000000Z"}, {"uuid": "4749ef53-3f6e-4b00-b9f7-5575ca04ddb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1615", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-10-18T12:25:41.000000Z"}, {"uuid": "589def12-613f-4295-95e6-db783ebed07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1602", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-13T16:57:01.000000Z"}, {"uuid": "baddad27-2194-428d-89fb-b6c5c39fec6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1554", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-08-30T06:52:02.000000Z"}, {"uuid": "8a76b65a-b83a-44b1-9cac-1d2831e0aa43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1531", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "a42a831b-5672-4361-b071-1d89f71de1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1520", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T05:42:04.000000Z"}, {"uuid": "35a47dd7-7f3e-419b-8707-02dd60d7dcc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "seen", "source": "https://t.me/HackerInvestigationZone/9", "content": "\ud83d\udea8_CvEploiterv2 x xWPv3 Ultimate/Beast Software\n\n\ud83c\udfafThe most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n\u00a0\u00a0\u00a0\u00a0 with the latest version/method.]\n\n\u2699\ufe0fCVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n \u2699\ufe0fCVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n\u2699\ufe0fCVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n\u2699\ufe0fCVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n\u2699\ufe0fCVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n\u2699\ufe0f#CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n\u2699\ufe0fCVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n\u2699\ufe0fCVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n\u2699\ufe0fCVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\n#Investigation_of_hacking \n#Cyber_Security_News\n#codeb0ss", "creation_timestamp": "2024-11-12T20:45:56.000000Z"}, {"uuid": "b470cb67-af2b-4fa5-a9dd-6e7bb6ba17c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "seen", "source": "https://t.me/cvedetector/1141", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6164 - Cisco Filter &amp; Grids WordPress Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6164 \nPublished : July 18, 2024, 6:15 a.m. | 35\u00a0minutes ago \nDescription : The Filter &amp; Grids WordPress plugin before 2.8.33 is vulnerable to Local File Inclusion via the post_layout parameter. This makes it possible for an unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T09:16:25.000000Z"}, {"uuid": "600fe38e-b74b-4d68-8f44-435d1dd63094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/3301", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2025-03-16T00:41:48.000000Z"}, {"uuid": "3c7ce878-39ad-48ce-bc52-460e61cf906b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/454", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-07T16:14:23.000000Z"}, {"uuid": "4ec9b555-0bed-4324-9b58-ca01e1414ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6164", "type": "published-proof-of-concept", "source": "https://t.me/leak503/506", "content": "CvEploiterv2 x xWPv3 [Ultimate/Beast Software.]\n\n[The most advanced software for CV 2024 expl0its and WordPress vulnerabilities\n     with the latest version/method.]\n\n1x =&gt; CVE-2024-38761 - Wordpress [Zephyr Project Manager] &lt; Unauthenticated Information Exposure.\n\n2x =&gt; CVE-2024-38759 - Wordpress [Search &amp; Replace] &lt; Unauthenticated PHP Object Injection.\n\n3x =&gt; CVE-2024-6313 - Wordpress [Gutenberg Forms] &lt; Unauthenticated Arbitrary File Upload.\n\n4x =&gt; CVE-2024-6164 - Wordpress [Filter &amp; Grids] &lt; Unauthenticated Local File Inclusion.\n\n5x =&gt; CVE-2024-40348 - \n[Bazarr] &lt; Unauthenticated Arbitrary File Read.\n\n6x =&gt; CVE-2024-4295 - Wordpress [Email Subscribers by Icegram Expres] &lt; Unauthenticated SQL Injection via Hash.\n\n7x =&gt; CVE-2024-4577 - PHP [CGI] &lt; Unauthenticated Command Injection.\n\n8x =&gt; CVE-2024-4836 - [Edito CMS] &lt; Unauthenticated Sensitive Data Leak.\n\n9x =&gt; CVE-2024-32399 - RaidenMAILD [MailServer] &lt; Unauthenticated Path Traversal.\n\nEnjoy;", "creation_timestamp": "2024-09-02T21:35:26.000000Z"}]}