{"vulnerability": "CVE-2024-1391", "sightings": [{"uuid": "b890b717-4cb8-4567-a0e3-7a212341a932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13913", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114159682393652236", "content": "", "creation_timestamp": "2025-03-14T07:48:35.801883Z"}, {"uuid": "0dd4cc2d-7f48-41b0-afe1-2366b59e19d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lkkbbbtrf22o", "content": "", "creation_timestamp": "2025-03-17T03:58:58.437054Z"}, {"uuid": "4635a90b-5685-4ab4-88e7-f7ce87b2a8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljzhrxmaoz2h", "content": "", "creation_timestamp": "2025-03-10T11:40:21.518975Z"}, {"uuid": "4b19fe59-8968-42d4-aaa3-ee850d5af261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lkkbbbtrf22o", "content": "", "creation_timestamp": "2025-03-17T03:58:58.517747Z"}, {"uuid": "89ded18e-6778-4f26-a699-c6947da96a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lkmijhmog22f", "content": "", "creation_timestamp": "2025-03-18T01:14:07.588977Z"}, {"uuid": "a1852abc-031e-40e0-9494-76decc27c7e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lkmijhmog22f", "content": "", "creation_timestamp": "2025-03-18T01:14:07.675954Z"}, {"uuid": "4433e113-b298-4da7-a307-6afcd7883521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkko762css2c", "content": "", "creation_timestamp": "2025-03-17T07:50:24.409368Z"}, {"uuid": "e196d648-8cc9-4b2c-a3df-c24db8c278f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkko762css2c", "content": "", "creation_timestamp": "2025-03-17T07:50:24.323889Z"}, {"uuid": "2785d827-39dc-4da3-9d61-97c12116c791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114137976660008505", "content": "", "creation_timestamp": "2025-03-10T11:48:30.540855Z"}, {"uuid": "37a50240-0ae2-4ecd-b17d-3195bf689fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114137976626483757", "content": "", "creation_timestamp": "2025-03-10T11:48:30.087408Z"}, {"uuid": "5e75a087-76e7-46f9-9171-4e772d1f3a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114138324497059173", "content": "", "creation_timestamp": "2025-03-10T13:16:58.172313Z"}, {"uuid": "ea02c510-f11b-4c19-876e-a0ea78d7b9fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114138324497059173", "content": "", "creation_timestamp": "2025-03-10T13:16:58.243622Z"}, {"uuid": "af67acf4-9f14-4d9d-bcb0-1a2467580172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljzsw6fmln2m", "content": "", "creation_timestamp": "2025-03-10T14:59:33.348130Z"}, {"uuid": "ba0a6623-745c-4c96-b9bc-6a3c2028d530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljzsw6soxq2x", "content": "", "creation_timestamp": "2025-03-10T14:59:34.205520Z"}, {"uuid": "da1e7f20-9b14-4a12-a00c-bdf946b04a2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ljzlwsbb3224", "content": "", "creation_timestamp": "2025-03-10T12:54:37.989426Z"}, {"uuid": "a3881b93-3ec8-4b9e-b6df-ea56f3170a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ljzlwwntpk2w", "content": "", "creation_timestamp": "2025-03-10T12:54:42.725185Z"}, {"uuid": "045142bb-d538-431c-9d1c-a61d31bb3258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13917", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqg23pb4aa2r", "content": "", "creation_timestamp": "2025-05-30T20:11:01.667645Z"}, {"uuid": "9f727c5f-b53f-48d5-850a-9b6274c58825", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13917", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqfnoqlx5uv2", "content": "", "creation_timestamp": "2025-05-30T16:29:09.329151Z"}, {"uuid": "ed01b78c-4ddb-4b05-87cc-52a4dbc844c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13916", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqfnorhcrrh2", "content": "", "creation_timestamp": "2025-05-30T16:29:09.848905Z"}, {"uuid": "abd7f681-48bd-4ff4-b7a8-f5d42d4325c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqfnoti27oe2", "content": "", "creation_timestamp": "2025-05-30T16:29:10.452656Z"}, {"uuid": "d3e54b0e-208f-4e5a-8389-c745ada8240e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13916", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqg2entthj2s", "content": "", "creation_timestamp": "2025-05-30T20:16:01.992943Z"}, {"uuid": "e0eb2bbe-a5e0-48d6-9757-79db62dc9b7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqfzsqmajr2q", "content": "", "creation_timestamp": "2025-05-30T20:06:01.101384Z"}, {"uuid": "c45b822f-36a1-4bd4-aad1-a13c94213918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13914", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6wrh5rtw2h", "content": "", "creation_timestamp": "2025-05-15T06:57:47.075615Z"}, {"uuid": "565ac1d7-20db-463b-a2d6-6a42452eb8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "https://thehackernews.com/2025/06/preinstalled-apps-on-ulefone-kruger.html", "content": "", "creation_timestamp": "2025-06-02T13:12:00.000000Z"}, {"uuid": "4048f8c2-4f58-4e22-a54c-6be60342caa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://t.me/cvedetector/19943", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13919 - Laravel Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-13919 \nPublished : March 10, 2025, 10:15 a.m. | 53\u00a0minutes ago \nDescription : The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of route parameters in the debug-mode error page. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T12:20:52.000000Z"}, {"uuid": "5d27da73-0fce-45c7-bab1-6870a88b0dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13910", "type": "seen", "source": "Telegram/JFy8u7YN3hg77163PbdM-kZZZ9HJ2N9usaMvjoPxJ5F42U6T", "content": "", "creation_timestamp": "2025-03-02T11:46:58.000000Z"}, {"uuid": "d66107a0-d646-47b5-a09e-b43bfd190c49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://t.me/cvedetector/19944", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13918 - Laravel Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13918 \nPublished : March 10, 2025, 10:15 a.m. | 53\u00a0minutes ago \nDescription : The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T12:20:53.000000Z"}, {"uuid": "3002dfd4-0c5c-400e-a4ef-7029c3744d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13911", "type": "seen", "source": "Telegram/oRRBSugfJuKPuc76LOtUjhj-VUtS6qCIUUmGq5oY81CUY-xJ", "content": "", "creation_timestamp": "2025-03-02T11:46:31.000000Z"}, {"uuid": "31119701-155e-46f9-a1e8-7f583f377f51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13910", "type": "seen", "source": "https://t.me/cvedetector/19232", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13910 - WordPress Database Backup and Check Tables Automated With Scheduler Plugin File Deletion Vulnerability (Arbitrary File Deletion)\", \n  \"Content\": \"CVE ID : CVE-2024-13910 \nPublished : March 1, 2025, 9:15 a.m. | 1\u00a0hour, 36\u00a0minutes ago \nDescription : The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'database_backup_ajax_delete' function in all versions up to, and including, 2.35. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 2.36. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T12:16:06.000000Z"}, {"uuid": "c6f7a593-27ce-4213-ad57-e783e34e5694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13911", "type": "seen", "source": "https://t.me/cvedetector/19222", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13911 - WordPress Database Backup and Check Tables Automated With Scheduler Plugin Sensitive Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13911 \nPublished : March 1, 2025, 8:15 a.m. | 31\u00a0minutes ago \nDescription : The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35 via the /dashboard/backup.php file. This makes it possible for authenticated attackers, with Administrator-level access and above, to extract sensitive data including full database credentials. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T10:35:39.000000Z"}, {"uuid": "13b0ec15-b25a-4a73-8dd3-f79aec4c2085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13910", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6066", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13910\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'database_backup_ajax_delete' function in all versions up to, and including, 2.35. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 2.36.\n\ud83d\udccf Published: 2025-03-01T08:23:21.649Z\n\ud83d\udccf Modified: 2025-03-01T08:23:21.649Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c92776c4-643c-40f2-ac28-5df5d6bf7fcd?source=cve\n2. https://plugins.trac.wordpress.org/browser/database-backup/trunk/database-backup.php#L267\n3. https://plugins.trac.wordpress.org/changeset/3247917/\n4. https://plugins.trac.wordpress.org/changeset/3248708/", "creation_timestamp": "2025-03-01T09:30:18.000000Z"}, {"uuid": "2fe967db-064a-4c20-85aa-3b68b1019ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6988", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13919\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of route parameters in the debug-mode error page.\n\ud83d\udccf Published: 2025-03-10T10:03:01.374Z\n\ud83d\udccf Modified: 2025-03-10T10:03:01.374Z\n\ud83d\udd17 References:\n1. https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-02_Laravel_Reflected_XSS_via_Route_Parameter_in_Debug-Mode_Error_Page\n2. https://github.com/laravel/framework/pull/53869\n3. https://github.com/laravel/framework/releases/tag/v11.36.0", "creation_timestamp": "2025-03-10T10:39:28.000000Z"}, {"uuid": "a2451505-195f-4a50-a5e3-27d8ca63141e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13913", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7530", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13913\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The InstaWP Connect \u2013 1-click WP Staging &amp; Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included.\n\ud83d\udccf Published: 2025-03-14T05:24:04.459Z\n\ud83d\udccf Modified: 2025-03-14T05:24:04.459Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/ea6c7b63-00da-4476-a024-97fe99af643d?source=cve\n2. https://plugins.trac.wordpress.org/browser/instawp-connect/trunk/admin/class-instawp-admin.php#L159\n3. https://plugins.trac.wordpress.org/browser/instawp-connect/trunk/migrate/templates/main.php#L27\n4. https://plugins.trac.wordpress.org/changeset/3254817/", "creation_timestamp": "2025-03-14T05:46:50.000000Z"}, {"uuid": "4cea4d94-adf6-4eb9-822a-881c2db9a8af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13914", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16450", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13914\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The File Manager Advanced Shortcode WordPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.4 (file-manager-advanced-shortcode) and 2.5.6 (advanced-file-manager-pro-premium), via the 'file_manager_advanced' shortcode. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary JavaScript files on the server. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. Sites currently using 2.5.4 (file-manager-advanced-shortcode) should be updated to 2.6.0 (advanced-file-manager-pro-premium).\n\ud83d\udccf Published: 2025-05-15T05:22:57.630Z\n\ud83d\udccf Modified: 2025-05-15T05:22:57.630Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/1500c72a-0621-4f97-9cab-0c9c8abeaf8f?source=cve\n2. https://advancedfilemanager.com/", "creation_timestamp": "2025-05-15T05:32:27.000000Z"}, {"uuid": "e9458a3d-7aa1-4d84-bde4-e5f63ae44ab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "Telegram/y4K9fjGlTAmL7-bu34_MvwCI8QvnT0oP9YmCmmX6pcRMTg", "content": "", "creation_timestamp": "2025-06-02T18:17:58.000000Z"}, {"uuid": "69766cbc-cb15-4754-9467-9bec43a2689c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13913", "type": "seen", "source": "https://t.me/cvedetector/20265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13913 - InstaWP Connect Cross-Site Request Forgery (CSRF) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13913 \nPublished : March 14, 2025, 6:15 a.m. | 27\u00a0minutes ago \nDescription : The InstaWP Connect \u2013 1-click WP Staging &amp; Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T08:20:44.000000Z"}, {"uuid": "27c2937c-c388-4c81-b35c-edfd9e29f1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "https://t.me/CyberBulletin/2668", "content": "\u26a1Laravel Framework Vulnerable to Reflected XSS Attacks (CVE-2024-13918 &amp; CVE-2024-13919).\n\n#CyberBulletin", "creation_timestamp": "2025-03-17T12:43:30.000000Z"}, {"uuid": "ecf1bc42-5602-4e02-b4d8-be5fb63b29d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "https://t.me/CyberBulletin/2668", "content": "\u26a1Laravel Framework Vulnerable to Reflected XSS Attacks (CVE-2024-13918 &amp; CVE-2024-13919).\n\n#CyberBulletin", "creation_timestamp": "2025-03-17T12:43:30.000000Z"}, {"uuid": "5906533a-2494-45d8-be50-03918492f9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13911", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13911\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35 via the /dashboard/backup.php file. This makes it possible for authenticated attackers, with Administrator-level access and above, to extract sensitive data including full database credentials.\n\ud83d\udccf Published: 2025-03-01T07:24:05.517Z\n\ud83d\udccf Modified: 2025-03-01T07:24:05.517Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c548b70a-8566-4aaf-a3a2-fce6c19e6a0c?source=cve\n2. https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L62\n3. https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L63\n4. https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L64\n5. https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L65\n6. https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L66\n7. https://plugins.trac.wordpress.org/changeset/3247917/", "creation_timestamp": "2025-03-01T08:27:08.000000Z"}, {"uuid": "4161fb09-80a5-444f-a90e-a540a12a1b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13918\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page.\n\ud83d\udccf Published: 2025-03-10T10:02:29.530Z\n\ud83d\udccf Modified: 2025-03-10T10:02:29.530Z\n\ud83d\udd17 References:\n1. https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-01_Laravel_Reflected_XSS_via_Request_Parameter_in_Debug-Mode_Error_Page\n2. https://github.com/laravel/framework/pull/53869\n3. https://github.com/laravel/framework/releases/tag/v11.36.0", "creation_timestamp": "2025-03-10T10:39:29.000000Z"}, {"uuid": "f806554c-8aef-449a-88de-3fe4474c1d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17849", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13915\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Android based smartphones from vendors such as Ulefone and\u00a0Kr\u00fcger&amp;Matz contain \"com.pri.factorytest\" application preloaded onto devices during manufacturing process.\nThe application\u00a0\"com.pri.factorytest\"\u00a0(version name: 1.0, version code: 1)\u00a0exposes a \u201dcom.pri.factorytest.emmc.FactoryResetService\u201c service allowing any application to perform a factory reset of the device.\u00a0\nApplication update did not increment the APK version. Instead, it was bundled in OS builds released later than December 2024 (Ulefone) and April 2025 (Kr\u00fcger&amp;Matz).\n\ud83d\udccf Published: 2025-05-30T15:09:58.520Z\n\ud83d\udccf Modified: 2025-06-10T08:49:37.732Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/05/CVE-2024-13915", "creation_timestamp": "2025-06-10T09:33:04.000000Z"}, {"uuid": "dff2889c-e581-4baa-841e-e67570c09564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13915", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13917\n\ud83d\udd25 CVSS Score: 8.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&amp;Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025.\n\ud83d\udccf Published: 2025-05-30T15:17:47.318Z\n\ud83d\udccf Modified: 2025-06-10T09:12:56.279Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/05/CVE-2024-13915", "creation_timestamp": "2025-06-10T09:33:02.000000Z"}, {"uuid": "5d3fdc0e-7896-4eca-8ef7-9c5a768e7a2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13916", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13917\n\ud83d\udd25 CVSS Score: 8.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&amp;Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025.\n\ud83d\udccf Published: 2025-05-30T15:17:47.318Z\n\ud83d\udccf Modified: 2025-06-10T09:12:56.279Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/05/CVE-2024-13915", "creation_timestamp": "2025-06-10T09:33:02.000000Z"}, {"uuid": "b583c0ba-6b08-49f7-baac-425856c9e2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13917", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13917\n\ud83d\udd25 CVSS Score: 8.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&amp;Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025.\n\ud83d\udccf Published: 2025-05-30T15:17:47.318Z\n\ud83d\udccf Modified: 2025-06-10T09:12:56.279Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/05/CVE-2024-13915", "creation_timestamp": "2025-06-10T09:33:02.000000Z"}, {"uuid": "e90e7680-dcc4-40cc-8cb7-f246afa99922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13919", "type": "seen", "source": "Telegram/iW8U3_nMoxaA79vuYKZZgyqiJjioPLHROfNeLhYnQIpOw7Q5", "content": "", "creation_timestamp": "2025-03-10T14:45:05.000000Z"}, {"uuid": "48827785-07d4-499e-b642-1a8554374516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13918", "type": "seen", "source": "Telegram/jAskTmheJlKc4HIPLVRBaB9da8VITehGiJthYLCa_amkK845", "content": "", "creation_timestamp": "2025-03-10T14:45:05.000000Z"}]}