{"vulnerability": "CVE-2024-1078", "sightings": [{"uuid": "1fd8e677-8b9c-4835-bd51-88959e9aab72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10785", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113519058567328792", "content": "", "creation_timestamp": "2024-11-21T04:29:30.186518Z"}, {"uuid": "9fda5f35-28e1-4f0c-bca4-72ec32be43b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10788", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113519338558879322", "content": "", "creation_timestamp": "2024-11-21T05:40:42.437646Z"}, {"uuid": "ee5b005d-617e-45e1-a6e7-d2d66d56e59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10786", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113490280837505655", "content": "", "creation_timestamp": "2024-11-16T02:30:56.487932Z"}, {"uuid": "3050f450-acaf-4d05-8a2c-87b9af92d9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10782", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113519338544704008", "content": "", "creation_timestamp": "2024-11-21T05:40:42.379946Z"}, {"uuid": "43d36184-a1f5-40e0-b7f4-cd5a3a7376df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113549601738257414", "content": "", "creation_timestamp": "2024-11-26T13:57:01.512549Z"}, {"uuid": "68f90239-4b30-4c42-a129-4ff30f936eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "seen", "source": "https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html", "content": "", "creation_timestamp": "2024-11-26T12:23:00.000000Z"}, {"uuid": "fbbce3b8-1c0a-4e91-9439-fda0d70c65ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113555661056371693", "content": "", "creation_timestamp": "2024-11-27T15:38:09.136302Z"}, {"uuid": "3704fefc-d636-45bd-aaa9-9a43bc567ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10787", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113593635864728955", "content": "", "creation_timestamp": "2024-12-04T08:35:29.648581Z"}, {"uuid": "9984ddd4-e82f-48ed-b18e-2dbb4cb2d957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113547632664236916", "content": "", "creation_timestamp": "2024-11-26T05:36:16.489182Z"}, {"uuid": "c54e5906-c290-47ed-9c56-409504742ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10780", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559953209960395", "content": "", "creation_timestamp": "2024-11-28T09:49:32.866844Z"}, {"uuid": "2c5cb0f0-5e9d-435d-987b-f650de3d96cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10784", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113638525151751112", "content": "", "creation_timestamp": "2024-12-12T06:51:25.376495Z"}, {"uuid": "3694a8ee-6aeb-438d-92c1-80f362f108e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113644811939302804", "content": "", "creation_timestamp": "2024-12-13T09:30:14.081481Z"}, {"uuid": "1b1b8ece-fbdc-47dc-bb25-59a3bf49fa27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10789", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113835909092626607", "content": "", "creation_timestamp": "2025-01-16T03:28:45.133078Z"}, {"uuid": "6dd04ca6-ca12-4d7a-aede-b02ad7495e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10789", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lftg7qwu4i2c", "content": "", "creation_timestamp": "2025-01-16T04:15:31.403837Z"}, {"uuid": "9a2aa713-7417-4343-a8c1-8a0a87a5394a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10789", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lftiey4fb62g", "content": "", "creation_timestamp": "2025-01-16T04:54:14.081798Z"}, {"uuid": "d228c12e-6caf-4632-9aa4-78444ee47f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-10783.yaml", "content": "", "creation_timestamp": "2025-03-24T14:32:29.000000Z"}, {"uuid": "b6cb3d55-7afd-485a-a3eb-523dab41f67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llcon67kys2t", "content": "", "creation_timestamp": "2025-03-26T21:02:12.253640Z"}, {"uuid": "52c78841-1d48-4b2b-8ef2-672882c2fe85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/99", "content": "This vuln is only exp when the plugin has not been connected to a MainWP Dashboard and the (Require unique sec ID) option is not enabled it is disabled by default.", "creation_timestamp": "2025-10-05T22:23:34.000000Z"}, {"uuid": "a19c277d-fe2f-4fbc-bb96-e3655e88b057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/i5Zrlju0KAZ8aHUCjq1Q43eeSfN56M-sSk9BtLB59qYPcpxTKw", "content": "", "creation_timestamp": "2025-10-06T07:03:22.000000Z"}, {"uuid": "c214462e-e0d7-47aa-8fdf-f99aa8ea3b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10789\n\ud83d\udd39 Description: The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-16T03:27:22.549Z\n\ud83d\udccf Modified: 2025-01-16T03:27:22.549Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/b056cc98-3bd8-493a-bbf4-9bcee2e52d24?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3222923/", "creation_timestamp": "2025-01-16T03:55:18.000000Z"}, {"uuid": "c740ef2f-7a79-42bb-8450-6cd630459459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/jA_DVqzBvok8aKl8FI4XVxK1MiLBtMNjqSSXDCz-9nD09y8V", "content": "", "creation_timestamp": "2025-10-06T07:03:35.000000Z"}, {"uuid": "c66e3c44-a806-4b7e-99d6-ee27bacd9881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "published-proof-of-concept", "source": "Telegram/iObTnhRKbaYnOfdcum70MuIyrQNxigsQBPmPgPLvD6uhQUk_FpY", "content": "", "creation_timestamp": "2025-10-06T07:03:23.000000Z"}, {"uuid": "f75de9bf-eb72-4c23-8ea5-f98c457b5606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10789", "type": "seen", "source": "https://t.me/cvedetector/15568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10789 - \"WordPress WP User Profile Avatar CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-10789 \nPublished : Jan. 16, 2025, 4:15 a.m. | 36\u00a0minutes ago \nDescription : The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T06:11:54.000000Z"}, {"uuid": "612ea3be-20ee-4110-ae42-1a7365ddd58b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10783", "type": "seen", "source": "https://t.me/cvedetector/12854", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10783 - MainWP Child WordPress Unconfigured Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10783 \nPublished : Dec. 13, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The MainWP Child \u2013 Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. This makes it possible for unauthenticated attackers to log in as an administrator on instances where MainWP Child is not yet connected to the MainWP Dashboard. IMPORTANT: this only affects sites who have MainWP Child installed and have not yet connected to the MainWP Dashboard, and do not have the unique security ID feature enabled. Sites already connected to the MainWP Dashboard plugin and do not have the unique security ID feature enabled, are NOT affected and not required to upgrade. Please note 5.2.1 contains a partial patch, though we consider 5.3 to be the complete patch. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T12:25:40.000000Z"}, {"uuid": "90ff7e53-b692-463a-bd84-00a15f16367c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10784", "type": "seen", "source": "https://t.me/cvedetector/12751", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10784 - Elementor Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10784 \nPublished : Dec. 12, 2024, 7:15 a.m. | 33\u00a0minutes ago \nDescription : The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018Tile Gallery' widget in all versions up to, and including, 1.5.126 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T08:48:57.000000Z"}, {"uuid": "b0a6976f-d196-42ec-87c7-acf3df45976c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10787", "type": "seen", "source": "https://t.me/cvedetector/11964", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10787 - Elementor LA-Studio Element Kit Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10787 \nPublished : Dec. 4, 2024, 9:15 a.m. | 37\u00a0minutes ago \nDescription : The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.4 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created by Elementor that they should not have access to. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T10:53:58.000000Z"}, {"uuid": "edd136ec-296f-4a93-87ea-29f38047ba75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "published-proof-of-concept", "source": "Telegram/ir8fz_LeIMyJdioGXHcZ5flDUiy-bVJJMbt_K53XI6bhxA", "content": "", "creation_timestamp": "2024-11-27T01:06:36.000000Z"}, {"uuid": "484523ba-c3d6-41b3-b683-f2a5bf7bdda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10786", "type": "seen", "source": "https://t.me/cvedetector/11202", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10786 - \"WordPress Simple Local Avatars Missing Capability Check Remote Code Execution\"\", \n  \"Content\": \"CVE ID : CVE-2024-10786 \nPublished : Nov. 16, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of datadue to a missing capability check on the sla_clear_user_cache function in all versions up to, and including, 2.7.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear user caches. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T05:12:10.000000Z"}, {"uuid": "a74fefdd-88da-4329-9fe8-2b684b4108b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10781", "type": "seen", "source": "https://t.me/true_secator/6476", "content": "Defiant \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u0434\u0432\u0443\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432 \u0430\u043d\u0442\u0438\u0441\u043f\u0430\u043c-\u043f\u043b\u0430\u0433\u0438\u043d\u0435 CleanTalk \u0434\u043b\u044f WordPress, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u0431\u043e\u043b\u0435\u0435 200 000 \u0441\u0430\u0439\u0442\u043e\u0432.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-10542 \u0438 CVE-2024-10781 \u0438 \u0438\u043c\u0435\u044e\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,8.\n\n\u041e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u043b\u0430\u0433\u0438\u043d\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f RCE.\n\nDefiant \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442, \u0447\u0442\u043e CVE-2024-10542 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043e\u0431\u0445\u043e\u0434 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0439 \u043d\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0445 \u0432\u044b\u0437\u043e\u0432\u043e\u0432 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043f\u043b\u0430\u0433\u0438\u043d\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u044e\u0449\u0438\u0439 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u044e \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0434\u043b\u044f \u044d\u0442\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0438 \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u043c\u0435\u043d\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u043f\u043e\u0434\u043c\u0435\u043d\u044b IP \u0438 DNS, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u043a\u0430\u0437\u0430\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0438\u043c\u0438 IP-\u0430\u0434\u0440\u0435\u0441 \u0438 \u043f\u043e\u0434\u0434\u043e\u043c\u0435\u043d \u0438 \u043e\u0431\u043e\u0439\u0442\u0438 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u044e.\n\n\u0417\u0430\u0442\u0435\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043b\u044e\u0431\u043e\u0435 \u0438\u0437 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439, \u0441\u0442\u043e\u044f\u0449\u0438\u0445 \u0437\u0430 \u044d\u0442\u043e\u0439 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u043c\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443, \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u044e, \u0434\u0435\u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u044e \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043f\u043b\u0430\u0433\u0438\u043d\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u043a\u043e\u043d\u0446\u0435 \u043e\u043a\u0442\u044f\u0431\u0440\u044f \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 1 \u043d\u043e\u044f\u0431\u0440\u044f \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c \u0432\u0435\u0440\u0441\u0438\u0438 6.44.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u043a CVE-2024-10781, \u0434\u0440\u0443\u0433\u043e\u043c\u0443 \u043c\u0435\u0442\u043e\u0434\u0443 \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0442\u043e\u043a\u0435\u043d\u0430.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0442\u043e\u043a\u0435\u043d \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f \u0445\u044d\u0448\u0430 \u0441 \u043a\u043b\u044e\u0447\u043e\u043c API, \u0435\u0441\u043b\u0438 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442 \u043d\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u043b \u043a\u043b\u044e\u0447 API \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0442\u043e\u043a\u0435\u043d, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0439 \u043f\u0443\u0441\u0442\u043e\u043c\u0443 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044e \u0445\u044d\u0448\u0430.\n\n\u041a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 \u043f\u0435\u0440\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, \u0443\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2024-10781 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u0438 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u043b\u0430\u0433\u0438\u043d\u044b, \u0430 \u0437\u0430\u0442\u0435\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u0434\u043b\u044f RCE.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f 6.45 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u044b\u043b\u0430 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u0430 14 \u043d\u043e\u044f\u0431\u0440\u044f.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043f\u043e\u00a0\u0434\u0430\u043d\u043d\u044b\u043c WordPress, \u0434\u043e \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u043a \u043f\u043b\u0430\u0433\u0438\u043d\u0430 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.45 \u0438\u043b\u0438 \u0436\u0435 \u0441\u0442\u0430\u0442\u044c \u0447\u0430\u0441\u0442\u044c\u044e \u043d\u0430\u043c\u0435\u0447\u0430\u044e\u0449\u0435\u0439\u0441\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043c\u0443\u0434\u0430\u043a\u043e\u0432.", "creation_timestamp": "2024-11-26T19:00:06.000000Z"}, {"uuid": "1d114496-af96-488d-bc25-119699388720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1078", "type": "seen", "source": "https://t.me/ctinow/197760", "content": "https://ift.tt/cPS1X0L\nCVE-2024-1078 | ays-pro Quiz Maker Plugin up to 6.5.2.4 on WordPress ays_quick_start/add_question_rows authorization (ID 3032035)", "creation_timestamp": "2024-03-01T16:16:42.000000Z"}, {"uuid": "a4335caa-1703-49ff-ac13-1ac8613a896f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1078", "type": "seen", "source": "https://t.me/ctinow/180586", "content": "https://ift.tt/cqSLWvO\nCVE-2024-1078", "creation_timestamp": "2024-02-07T09:31:22.000000Z"}]}