{"vulnerability": "CVE-2024-1393", "sightings": [{"uuid": "e6a5480b-843b-4047-a777-7448b4834d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13930", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprv4otuvs2k", "content": "", "creation_timestamp": "2025-05-22T19:48:51.150655Z"}, {"uuid": "526f81b4-787c-43ed-be28-6c9ebb2b131e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13933", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqfwsy3rw2j", "content": "", "creation_timestamp": "2025-03-19T14:38:30.663295Z"}, {"uuid": "50961f07-cd5a-45b7-a51b-4ebebf8b7c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13933", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114189644574652729", "content": "", "creation_timestamp": "2025-03-19T14:48:20.526403Z"}, {"uuid": "c6ab7826-c5b3-4c26-a04c-f40de4e69b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9252", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13939\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.\n\nAs stated in the documentation: \"If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents).\"\n\nThis is similar to\u00a0CVE-2020-36829\n\ud83d\udccf Published: 2025-03-28T02:05:01.416Z\n\ud83d\udccf Modified: 2025-03-28T02:05:01.416Z\n\ud83d\udd17 References:\n1. https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL", "creation_timestamp": "2025-03-28T02:28:07.000000Z"}, {"uuid": "63735079-0b95-4e99-935c-89247e6bf079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13931", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprvwb76w72q", "content": "", "creation_timestamp": "2025-05-22T20:03:09.337251Z"}, {"uuid": "0a742fbd-dfbd-457a-bb91-f56fad1281cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13939", "type": "seen", "source": "https://t.me/cvedetector/21369", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13939 - Apache::String::Compare::ConstantTime Timing Attack Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13939 \nPublished : March 28, 2025, 3:15 a.m. | 51\u00a0minutes ago \nDescription : String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.  \n  \nAs stated in the documentation: \"If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents).\"  \n  \nThis is similar to\u00a0CVE-2020-36829 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T05:12:23.000000Z"}, {"uuid": "d6d74419-8c26-4b1c-a38a-035c0e12bb69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13933", "type": "seen", "source": "https://t.me/cvedetector/20633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13933 - FoodBakery | Delivery Restaurant Directory WordPress Theme Cross-Site Request Forgery Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13933 \nPublished : March 19, 2025, 12:15 p.m. | 53\u00a0minutes ago \nDescription : The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T14:38:44.000000Z"}, {"uuid": "a9a0a9e6-855a-408a-9627-f511a5113d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13933", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13933\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-03-19T11:10:37.382Z\n\ud83d\udccf Modified: 2025-03-19T13:44:24.695Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/45eda79d-f999-413e-88ce-b7d06f09f191?source=cve\n2. https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331", "creation_timestamp": "2025-03-19T13:49:08.000000Z"}]}