{"vulnerability": "cve-2024-9290", "sightings": [{"uuid": "9bb64a0d-dc5d-4176-93d7-8fc1e51e4e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9290", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644811971420753", "content": "", "creation_timestamp": "2024-12-13T09:30:14.589195Z"}, {"uuid": "c4200a5d-01e9-4302-89b2-9870e9bd5c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-9290", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113709448379200629", "content": "", "creation_timestamp": "2024-12-24T19:28:07.676929Z"}, {"uuid": "960d09ac-02b6-4837-ac3b-7782abd04a86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9290", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3le36ij6sis2n", "content": "", "creation_timestamp": "2024-12-24T19:28:11.566898Z"}, {"uuid": "813d58ff-acd8-4068-979f-5bfcd7163e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9290", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783261956597491", "content": "", "creation_timestamp": "2025-01-06T20:19:53.508225Z"}, {"uuid": "669045ac-408f-4c01-92e5-ca1280756adb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9290", "type": "seen", "source": "https://t.me/cvedetector/12853", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9290 - Acron Cafe's Super Backup &amp; Clone - Migrate for WordPress Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9290 \nPublished : Dec. 13, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The Super Backup &amp; Clone - Migrate for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and a missing capability check on the ibk_restore_migrate_check() function in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T12:25:39.000000Z"}, {"uuid": "a2b35014-3fee-4751-aabf-1df519f33956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9290", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/9481", "content": "\ud83d\udea8CVE-2024-9290 Exploit Tool | Super Backup &amp; Clone Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-9290-exploit-tool-super-backup-clone-vulnerability/", "creation_timestamp": "2024-12-24T21:30:06.000000Z"}]}