{"vulnerability": "CVE-2024-12209", "sightings": [{"uuid": "9bc794fc-55d2-4860-8568-3fdf68bf7d00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113615570697901377", "content": "", "creation_timestamp": "2024-12-08T05:33:48.010759Z"}, {"uuid": "0050df2e-69b6-4a9a-90f5-07c5771288fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113618202280680817", "content": "", "creation_timestamp": "2024-12-08T16:43:02.635448Z"}, {"uuid": "531ec4bb-7377-4ca6-aebd-fa77ee012cd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-12209.yaml", "content": "", "creation_timestamp": "2024-12-09T19:05:38.000000Z"}, {"uuid": "2bef896a-dd2d-4bea-a60d-5204f7e0f63b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783263021420100", "content": "", "creation_timestamp": "2025-01-06T20:20:09.785213Z"}, {"uuid": "02356267-33d0-4e92-a38f-a380605eb562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://t.me/cvedetector/12330", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12209 - \"WP Umbrella: Remote File Execution via arbitrary file inclusion\"\", \n  \"Content\": \"CVE ID : CVE-2024-12209 \nPublished : Dec. 8, 2024, 6:15 a.m. | 22\u00a0minutes ago \nDescription : The WP Umbrella: Update Backup Restore &amp; Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-08T07:45:18.000000Z"}, {"uuid": "40000e2b-e067-4420-9e7f-dd2bfbe89718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://t.me/CyberBulletin/1711", "content": "\u26a1\ufe0fCVE-2024-12209 (CVSS 9.8): WP Umbrella Plugin Vulnerability Exposes 30,000 Websites to Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-12-08T11:24:47.000000Z"}, {"uuid": "b325de5c-ccd4-4217-b59a-85f4c4f13e6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3likodqzbx425", "content": "", "creation_timestamp": "2025-02-19T21:02:37.895931Z"}, {"uuid": "064887bd-e4df-4959-95bb-d34457c2f54a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "4119efcb-700f-41e0-86a7-b57e0a8d01f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://t.me/CyberBulletin/26733", "content": "\u26a1\ufe0fCVE-2024-12209 (CVSS 9.8): WP Umbrella Plugin Vulnerability Exposes 30,000 Websites to Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-12-08T11:24:46.000000Z"}, {"uuid": "b7a76eb7-ed86-4782-8eca-340609cd0470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/768", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2024-12-24T12:49:11.000000Z"}, {"uuid": "28c122cb-b9c5-47da-8d06-7f7af86c1340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/245", "content": "https://github.com/Nxploited/CVE-2024-12209\n\nUnauthenticated Local File Inclusion\n#github #exploit", "creation_timestamp": "2024-12-24T11:45:43.000000Z"}, {"uuid": "3ec1cae5-0da1-47c0-8a45-d7b6f09abdd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11600", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2024-12-24T17:57:48.000000Z"}, {"uuid": "2e1645b3-7d5d-4256-9733-14ab88eb0f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12209", "type": "seen", "source": "https://t.me/suboxone_chatroom/1577", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2025-01-27T07:07:44.000000Z"}]}