{"vulnerability": "CVE-2024-1336", "sightings": [{"uuid": "3e39f7d8-b0cc-43ab-b0b8-21621862697a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13366", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfwarfndkp2f", "content": "", "creation_timestamp": "2025-01-17T07:16:00.020103Z"}, {"uuid": "4b33ba19-df98-4f37-badb-d8f97e8b4131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13367", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfwarhuj3p2n", "content": "", "creation_timestamp": "2025-01-17T07:16:02.380079Z"}, {"uuid": "c677d22a-89a8-4d7f-9a11-ea1cd002130c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13366", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113842471639555162", "content": "", "creation_timestamp": "2025-01-17T07:17:41.708879Z"}, {"uuid": "dde945b3-d407-4046-a6f2-4c23be872e7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13367", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113842471654580608", "content": "", "creation_timestamp": "2025-01-17T07:17:41.911475Z"}, {"uuid": "dc1c0527-7c32-45ce-ad00-67e61aa2d626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13366", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfwc2dcqa22u", "content": "", "creation_timestamp": "2025-01-17T07:38:54.166444Z"}, {"uuid": "5b4ea31e-af91-47ca-9804-7da1a9f0560b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13367", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfwc2dfur52g", "content": "", "creation_timestamp": "2025-01-17T07:38:54.709089Z"}, {"uuid": "3063cf35-33e6-41e7-b297-b784e9d06942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13368", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113887931264398586", "content": "", "creation_timestamp": "2025-01-25T07:58:40.543054Z"}, {"uuid": "6c67a70f-b2f5-4bb4-bcf3-3d0112db4044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13360", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgcwh3gmx62j", "content": "", "creation_timestamp": "2025-01-22T08:15:53.278877Z"}, {"uuid": "794ae485-01fa-41a9-ac7d-d8df98e3165f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13361", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgcwhdfn4z2p", "content": "", "creation_timestamp": "2025-01-22T08:16:01.365631Z"}, {"uuid": "fac9dd0b-0eba-4871-8dfc-2f8e02e45378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13360", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgcylzwzah2w", "content": "", "creation_timestamp": "2025-01-22T08:54:27.043737Z"}, {"uuid": "9211a36c-89f8-4a71-b9af-d58e04f13457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13361", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgcym25n4s25", "content": "", "creation_timestamp": "2025-01-22T08:54:28.121499Z"}, {"uuid": "fee41fbe-adfd-4156-ba34-dcc419fe31d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/digitaldotsl.bsky.social/post/3li2hstswsk2g", "content": "", "creation_timestamp": "2025-02-13T10:23:07.336826Z"}, {"uuid": "0c0e3c6d-bb19-4abc-9ad0-906679d47520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsvnmzm2a", "content": "", "creation_timestamp": "2025-02-13T02:02:05.750124Z"}, {"uuid": "321fe247-8756-4e4e-b844-f59415b3319e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhzlsx6vbt2o", "content": "", "creation_timestamp": "2025-02-13T02:02:07.465142Z"}, {"uuid": "beb78073-7486-49fa-b5b0-70def1387cfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113990205039131652", "content": "", "creation_timestamp": "2025-02-12T09:28:15.439426Z"}, {"uuid": "116befea-d18d-42d7-abef-67adfde954d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxwws3sme2p", "content": "", "creation_timestamp": "2025-02-12T10:15:46.140204Z"}, {"uuid": "3db9c558-c8fe-4e98-912d-58b4e4575dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113990520291059526", "content": "", "creation_timestamp": "2025-02-12T10:48:24.815636Z"}, {"uuid": "c929dc83-3823-4f21-bdee-d9a138ca5fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxzp7y3rw23", "content": "", "creation_timestamp": "2025-02-12T11:05:13.951454Z"}, {"uuid": "d539e114-be9b-4569-b706-4fc69fda4c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoyg6yg2a", "content": "", "creation_timestamp": "2025-02-13T15:25:11.640981Z"}, {"uuid": "6794090d-2a4f-4bbc-b9f0-24b485c6457e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2yoys2zr2t", "content": "", "creation_timestamp": "2025-02-13T15:25:12.476562Z"}, {"uuid": "542619b3-6d49-4daf-ace1-3b8d414b284d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "19f3e058-5945-4df5-b8dd-9fff0fb2d32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13369", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ligzskwjrv2p", "content": "", "creation_timestamp": "2025-02-18T10:17:02.080695Z"}, {"uuid": "1d9b98ad-05ae-45f7-ba91-e367859b7724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13363", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lijgtngtw523", "content": "", "creation_timestamp": "2025-02-19T09:15:36.048261Z"}, {"uuid": "ae89fa64-81a2-49e6-9043-87c988f04c28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13364", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lijgtptino2o", "content": "", "creation_timestamp": "2025-02-19T09:15:38.530802Z"}, {"uuid": "ae9e5855-549e-4089-a5bc-8d4ea3e66477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3li46yrgtds2y", "content": "", "creation_timestamp": "2025-02-14T02:50:46.482226Z"}, {"uuid": "07a427bf-f402-449b-8910-ab937f2a0e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13363", "type": "seen", "source": "https://t.me/cvedetector/18421", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13363 - WordPress Raptive Ads Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13363 \nPublished : Feb. 19, 2025, 9:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T12:03:05.000000Z"}, {"uuid": "11110bdf-8ef1-4c7c-be69-10546bcf53f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13369", "type": "seen", "source": "https://t.me/cvedetector/18321", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13369 - Tour Master WordPress Tour Booking SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13369 \nPublished : Feb. 18, 2025, 10:15 a.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : The Tour Master - Tour Booking, Travel, Hotel plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018review_id\u2019 parameter in all versions up to, and including, 5.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T12:38:10.000000Z"}, {"uuid": "57dbf442-1711-4d63-920d-ae439ca7bf04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13364", "type": "seen", "source": "https://t.me/cvedetector/18422", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13364 - Raptive Ads Plugin WordPress Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13364 \nPublished : Feb. 19, 2025, 9:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T12:03:06.000000Z"}, {"uuid": "c8998f73-2459-4956-a279-d703177e3209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13367", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2105", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13367\n\ud83d\udd39 Description: The Sandbox plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the export_download action in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download an entire copy of a sandbox environment which can contain sensitive information like the wp-config.php file.\n\ud83d\udccf Published: 2025-01-17T07:01:27.847Z\n\ud83d\udccf Modified: 2025-01-17T07:01:27.847Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/59880d92-5d75-432f-9fb5-d74b13d101ff?source=cve\n2. https://plugins.trac.wordpress.org/browser/sandbox/trunk/sandbox-ajax.php#L21", "creation_timestamp": "2025-01-17T07:56:38.000000Z"}, {"uuid": "8b1afece-3c89-4846-ac76-384829bbed72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13366", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2107", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13366\n\ud83d\udd39 Description: The Sandbox plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'debug' parameter in all versions up to, and including, 0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-17T07:01:27.064Z\n\ud83d\udccf Modified: 2025-01-17T07:01:27.064Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/3fc752bb-3f1d-4106-9df1-361564905a55?source=cve\n2. https://wordpress.org/plugins/sandbox/", "creation_timestamp": "2025-01-17T07:56:40.000000Z"}, {"uuid": "a802bb5a-7c2c-4214-b07d-72bb35aa188f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13360", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2526", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13360\n\ud83d\udd39 Description: The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n\ud83d\udccf Published: 2025-01-22T07:29:39.434Z\n\ud83d\udccf Modified: 2025-01-22T07:29:39.434Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf6cbba-0e0c-4d2c-90d0-d7e0a5222df2?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3224162/", "creation_timestamp": "2025-01-22T08:02:01.000000Z"}, {"uuid": "4e26ffba-330a-42a4-ad62-085f4221900e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13368", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3060", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13368\n\ud83d\udd39 Description: The Youzify \u2013 BuddyPress Community, User Profile, Social Network &amp; Membership Plugin for WordPress plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the youzify_offer_banner() function in all versions up to, and including, 1.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary site options to a value of one.\n\ud83d\udccf Published: 2025-01-25T07:24:16.664Z\n\ud83d\udccf Modified: 2025-01-25T07:24:16.664Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2abd5b-3067-4dcd-a650-b543fa03437b?source=cve\n2. https://plugins.trac.wordpress.org/browser/youzify/tags/1.3.2/includes/admin/core/functions/youzify-general-functions.php#L961", "creation_timestamp": "2025-01-25T08:05:37.000000Z"}, {"uuid": "59efa7bf-16ea-436b-86e3-b1b0be706f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13361", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2527", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13361\n\ud83d\udd39 Description: The AI Power: Complete AI Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpaicg_save_image_media function in all versions up to, and including, 1.8.96. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload image files and embed shortcode attributes in the image_alt value that will execute when sending a POST request to the attachment page.\n\ud83d\udccf Published: 2025-01-22T07:29:38.809Z\n\ud83d\udccf Modified: 2025-01-22T07:29:38.809Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/11d49c89-43be-4e12-86b5-aa7a72a89803?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3224162/gpt3-ai-content-generator/trunk/classes/wpaicg_image.php", "creation_timestamp": "2025-01-22T08:02:05.000000Z"}, {"uuid": "62182069-826d-402c-b411-da299b2d3d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/cvedetector/17845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13365 - \"CleanTalk Plugin for WordPress Arbitrary File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13365 \nPublished : Feb. 12, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : The Security &amp; Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function  in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T12:41:50.000000Z"}, {"uuid": "70ce032f-3459-4927-bc04-ae51532df9c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4076", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13365\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T10:15:10.547\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://plugins.trac.wordpress.org/changeset/3229205/security-malware-firewall#file527\n2. https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa30fa2-6c42-4e5f-a0b5-8711ce5d8121?source=cve", "creation_timestamp": "2025-02-12T11:12:34.000000Z"}, {"uuid": "aaa3d7c9-1ba5-41cb-a4e2-ce2066b4683b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4101", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13365\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: The Security &amp; Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function  in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-02-12T12:30:46Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13365\n2. https://plugins.trac.wordpress.org/changeset/3229205/security-malware-firewall#file527\n3. https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa30fa2-6c42-4e5f-a0b5-8711ce5d8121?source=cve", "creation_timestamp": "2025-02-12T13:14:10.000000Z"}, {"uuid": "6bd386d3-3b38-473a-851d-d7bdb7436f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13366", "type": "seen", "source": "https://t.me/cvedetector/15690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13366 - WordPress Sandbox Plugin Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13366 \nPublished : Jan. 17, 2025, 7:15 a.m. | 42\u00a0minutes ago \nDescription : The Sandbox plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'debug' parameter in all versions up to, and including, 0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T09:16:02.000000Z"}, {"uuid": "9bf866fb-bc37-4d43-bd96-22a3388684e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13368", "type": "seen", "source": "https://t.me/cvedetector/16373", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13368 - Youzify BuddyPress Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-13368 \nPublished : Jan. 25, 2025, 8:15 a.m. | 42\u00a0minutes ago \nDescription : The Youzify \u2013 BuddyPress Community, User Profile, Social Network &amp; Membership Plugin for WordPress plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the youzify_offer_banner() function in all versions up to, and including, 1.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary site options to a value of one. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-25T10:28:51.000000Z"}, {"uuid": "00f4531b-d9b4-4711-8fd4-fa123ea254c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13367", "type": "seen", "source": "https://t.me/cvedetector/15684", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13367 - \"WordPress Sandbox Plugin Unauthenticated File Download Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13367 \nPublished : Jan. 17, 2025, 7:15 a.m. | 42\u00a0minutes ago \nDescription : The Sandbox plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the export_download action in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download an entire copy of a sandbox environment which can contain sensitive information like the wp-config.php file. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T09:15:54.000000Z"}, {"uuid": "7a40c77a-ea3b-4ca6-81d5-3fd12c231b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13361", "type": "seen", "source": "https://t.me/cvedetector/16085", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13361 - WordPress Complete AI Pack Plugin Cross-Site Scripting (XSS) and Unauthenticated File Upload\", \n  \"Content\": \"CVE ID : CVE-2024-13361 \nPublished : Jan. 22, 2025, 8:15 a.m. | 20\u00a0minutes ago \nDescription : The AI Power: Complete AI Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpaicg_save_image_media function in all versions up to, and including, 1.8.96. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload image files and embed shortcode attributes in the image_alt value that will execute when sending a POST request to the attachment page. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T09:42:32.000000Z"}, {"uuid": "4b0b8ae4-7018-4513-add2-73ad5cde2b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13360", "type": "seen", "source": "https://t.me/cvedetector/16084", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13360 - WordPress AI Power: Complete AI Pack SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13360 \nPublished : Jan. 22, 2025, 8:15 a.m. | 20\u00a0minutes ago \nDescription : The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T09:42:31.000000Z"}, {"uuid": "50c004c9-0b33-4d61-8da3-3757e2ec271b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13368", "type": "seen", "source": "Telegram/sEiqdx3u95zjhNN18j49RrHoxxdE7x-08gpc2I_aetqjznun", "content": "", "creation_timestamp": "2025-02-06T02:42:29.000000Z"}, {"uuid": "9a5e1054-c4f9-4b67-9adc-cad419accd6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13369", "type": "seen", "source": "Telegram/4op9o7togZWDibEvlAojc60R92YQWt95kZO9NNyn38FpxXTJ", "content": "", "creation_timestamp": "2025-02-18T11:39:00.000000Z"}, {"uuid": "3eab6eae-f66c-45a5-8e40-b243aef6ce94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13365", "type": "seen", "source": "https://t.me/CyberBulletin/2326", "content": "\u26a1Hackers Can Take Over 30,000 WordPress Sites Due to Critical CleanTalk Security Flaw (CVE-2024-13365).\n\n#CyberBulletin", "creation_timestamp": "2025-02-14T15:20:22.000000Z"}, {"uuid": "7b32fe16-d793-47c2-b5e1-c8d2aaf836d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2wsftiia2s", "content": "CVE-2024-13362 events-addon-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T00:33:05.914865Z"}, {"uuid": "154c224d-ef52-4e21-9872-f0ecc91c54e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1336", "type": "seen", "source": "https://t.me/ctinow/198293", "content": "https://ift.tt/cdkBzs6\nCVE-2024-1336 | ImageRecycle PDF &amp; Image Compression Plugin up to 3.1.13 on WordPress Setting optimizeAllOn cross-site request forgery (ID 3031424)", "creation_timestamp": "2024-03-02T09:36:11.000000Z"}, {"uuid": "28ff0897-7e4c-4693-b4de-a89442ae35f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkrkanvanl2i", "content": "CVE-2024-13362 - Freemius\nCVE ID : CVE-2024-13362\n \n Published : May 1, 2026, 5:29 a.m. | 49\u00a0minutes ago\n \n Description : Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient...", "creation_timestamp": "2026-05-01T06:54:27.479088Z"}, {"uuid": "85501c91-a7c0-4e27-936e-e548cca2c538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2q3tjkdc2i", "content": "CVE-2024-13362 yet-another-stars-rating (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-04T22:33:05.655712Z"}, {"uuid": "8af8f5bb-0d8c-4c2e-8dd4-e4728350c8ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3aubnzwo24", "content": "CVE-2024-13362 woo-coupon-usage (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T03:33:06.126357Z"}, {"uuid": "e5d0434d-a4eb-4325-aeee-d60e8aa9dfd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3e7kzgrp2h", "content": "CVE-2024-13362 wp-books-gallery (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T04:33:05.756032Z"}, {"uuid": "ad29dc6e-c0c5-49b1-9ed8-4f0d3782e604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3hkugamy2h", "content": "CVE-2024-13362 bp-better-messages (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T05:33:06.193656Z"}, {"uuid": "11a44a43-a07c-46ec-be1b-086087056e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13364", "type": "seen", "source": "Telegram/Gj1cLMj0b3E0PXIfTOdlhYvkrZXk36M1mBoc_O8K4gJXHpHI", "content": "", "creation_timestamp": "2025-02-19T15:39:58.000000Z"}, {"uuid": "bee13fef-bcec-4d5d-9fc7-bf37ccc19016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13363", "type": "seen", "source": "Telegram/YdrpF2x6UBV-oEoV5u--OrpRbPmmEYFwZxS5MZ4iq-x_wjv4", "content": "", "creation_timestamp": "2025-02-19T15:39:58.000000Z"}, {"uuid": "6a9f31f6-e6e8-4b75-afe6-d46a9a2de3d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2th5p7fl2u", "content": "CVE-2024-13362 spotlight-social-photo-feeds (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-04T23:33:06.749942Z"}, {"uuid": "285ebc9b-650a-4c10-8a3f-472a492a8c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3kw5dyfo2s", "content": "CVE-2024-13362 widget-for-eventbrite-api (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T06:33:05.435294Z"}, {"uuid": "ca8419f2-69e6-47e8-8805-25eb528fa0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3rmplhzw2i", "content": "CVE-2024-13362 cf7-styler (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T08:33:05.518817Z"}, {"uuid": "c156c8a0-cf98-4319-92d9-e052746e728c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3uxz5vyb2s", "content": "CVE-2024-13362 interactive-geo-maps (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T09:33:05.809007Z"}, {"uuid": "a5568338-0f93-4e5c-8895-2e60dcb11dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml325p4d762l", "content": "CVE-2024-13362 music-player-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T01:33:05.352894Z"}, {"uuid": "69c28e41-dc6f-4697-ba7e-daf2304ec193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3obgvq6r2h", "content": "CVE-2024-13362 primary-addon-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T07:33:05.841469Z"}, {"uuid": "9272aa7b-33d5-4836-b9ee-a646fcd504ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml35izexw52s", "content": "CVE-2024-13362 share-this-image (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T02:33:06.580627Z"}, {"uuid": "e7f144a2-f05b-4c9d-9327-b835424a1cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml43olqrv42a", "content": "CVE-2024-13362 url-shortify (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T11:33:05.882525Z"}, {"uuid": "8c0d37a1-e3a9-4e75-8039-b6ba2d1fafbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4cf64tt72h", "content": "CVE-2024-13362 eazydocs (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T13:33:05.573515Z"}, {"uuid": "af47e56e-33c8-4e3f-84fd-c300f844c5ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3ydcfqip2g", "content": "CVE-2024-13362 gpt3-ai-content-generator (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T10:33:06.133995Z"}, {"uuid": "d8ac0daa-fa89-4071-b9e9-31aaae7d9ec2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4j3qyhcd2s", "content": "CVE-2024-13362 webba-booking-lite (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T15:33:06.282463Z"}, {"uuid": "c210b2a6-2d41-421b-b0a8-24a7ca5f8449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4fqhj5422i", "content": "CVE-2024-13362 ga-for-wp (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T14:33:06.465794Z"}, {"uuid": "58bb242c-59d8-4208-bfba-7199013e22b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4mh27w5x2c", "content": "CVE-2024-13362 master-addons (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T16:33:06.126843Z"}, {"uuid": "d65d25bc-948e-4c68-b622-88cbbe26b10b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4wiwvyjw2x", "content": "CVE-2024-13362 b-blocks (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T19:33:07.079497Z"}, {"uuid": "fe2c241c-c657-4287-86c6-c8632e90dcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13362", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml557is25h2h", "content": "CVE-2024-13362 blockspare (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "creation_timestamp": "2026-05-05T21:33:06.550070Z"}]}