{"vulnerability": "CVE-2020-24186", "sightings": [{"uuid": "11afc788-e99f-4a30-a4b6-4bc0d93d640f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "MISP/bf62ed7d-f3df-41f1-a8c0-73ff8202aeb9", "content": "", "creation_timestamp": "2024-11-14T06:07:36.000000Z"}, {"uuid": "838b88a4-bdd3-4fc7-a530-53f62eea3748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "9ad5fa4e-1913-4c94-86c9-ec848800f2ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/spammerspacer/33792", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "21aa0414-b8f1-437d-bb8c-89e3883748fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:26.000000Z"}, {"uuid": "1297b489-4c33-459d-9e5e-14e32b17c7f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload.rb", "content": "", "creation_timestamp": "2021-06-25T21:29:57.000000Z"}, {"uuid": "7ab0b250-d490-4500-b223-441b0db08ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "Telegram/a_4VnqJN-RhZx2H5rHBxPohdQGS9QEJyM7-FGAkYNk33fA", "content": "", "creation_timestamp": "2023-12-22T14:27:49.000000Z"}, {"uuid": "0adbe5b5-bcbe-4fe0-b01b-9097383b2da0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/spammermarketool/39118", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "6fb7699d-cfc6-4ae7-9cab-eeac8cba570c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3712", "content": "https://github.com/hev0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\n\nwpDiscuz 7.0.4 Remote Code Execution \n#github  #exploit", "creation_timestamp": "2023-12-22T15:27:17.000000Z"}, {"uuid": "8bfe02fd-644f-4dde-a231-526accc7cc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "https://t.me/arpsyndicate/1791", "content": "#ExploitObserverAlert\n\nCVE-2020-24186\n\nDESCRIPTION: Exploit Observer has 17 entries related to CVE-2020-24186. A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.\n\nFIRST-EPSS: 0.974170000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-12T01:56:09.000000Z"}, {"uuid": "4a11cf8d-05b4-4594-afc8-890fb1bf5e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "Telegram/qA7RHbfeiqXzFaQFtQDWHegpUj17EgvuINx_Fz9sXMRGmneY", "content": "", "creation_timestamp": "2022-06-20T20:34:58.000000Z"}, {"uuid": "84a8de09-f078-49c7-b3e3-c972cf6a594f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "Telegram/dt3wzguPwvHeMGbS-iOOUe43Y1n6HJwkKjrvq5BX_wYbkhfe", "content": "", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}, {"uuid": "9cc537fe-678f-4e31-acae-5f247dd4b840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/intelexch/11722", "content": "https://github.com/Sakura-501/CVE-2020-24186-exploit", "creation_timestamp": "2022-04-06T13:34:15.000000Z"}, {"uuid": "0d931a48-8edb-4bed-bd82-f6c587c5fe85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9637", "content": "#exploit\n1. CVE-2023-50072\nXSS vulnerability in OpenKM ver. 7.1.40\nhttps://github.com/ahrixia/CVE-2023-50072\n\n2. CVE-2020-24186:\nWordPress wpDiscuz 7.0.4 RCE\nhttps://github.com/hev0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\n]-&gt; reverse shell upload: https://github.com/substing/CVE-2020-24186_reverse_shell_upload", "creation_timestamp": "2023-12-22T13:47:08.000000Z"}, {"uuid": "91a4477a-2a1a-4c81-8a07-5d06140961ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/LeakingXTeam/20993", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "7e3e1824-4909-4df7-adb3-2dcc65e6bcb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "seen", "source": "https://t.me/ctinow/158617", "content": "https://ift.tt/HMTu2Us\nCVE-2020-24186 Exploit", "creation_timestamp": "2023-12-22T21:18:53.000000Z"}, {"uuid": "1daacf2f-4747-4a37-baa9-41767a66f8da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1745", "content": "https://github.com/hev0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\n\nwpDiscuz 7.0.4 Remote Code Execution \n#github  #exploit", "creation_timestamp": "2023-12-23T20:45:37.000000Z"}, {"uuid": "610ab720-8fbf-4c78-bb9a-b0c88f2a515d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/hackingtoolsprvi8/2727", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}, {"uuid": "99c1d2a8-b92f-4913-bedc-538fc1190854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24186", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2320", "content": "#exploit\n1. CVE-2023-50072\nXSS vulnerability in OpenKM ver. 7.1.40\nhttps://github.com/ahrixia/CVE-2023-50072\n\n2. CVE-2020-24186:\nWordPress wpDiscuz 7.0.4 RCE\nhttps://github.com/hev0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\n]-&gt; reverse shell upload: https://github.com/substing/CVE-2020-24186_reverse_shell_upload", "creation_timestamp": "2024-08-16T08:57:36.000000Z"}]}