{"vulnerability": "CVE-2024-21644", "sightings": [{"uuid": "b56d3f34-a39e-4f3e-92f0-9f2778656b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/bexsop/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-14T13:46:34.000000Z"}, {"uuid": "76e09f90-8cd5-4dc1-bf1c-a0d6cf7b901a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "Telegram/eU5TW0NrIabaH627FpFKhEBuxk5i4RkIq4T6rxIMq7cGCQ", "content": "", "creation_timestamp": "2025-03-05T22:29:05.000000Z"}, {"uuid": "9ce9f721-32f8-433b-ab05-e3c7b121dcfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/313", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-02-26T20:19:03.000000Z"}, {"uuid": "ace12fd3-1a6b-4fc7-938d-46dc5d8ed594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/16004", "content": "CVE-2024-21644\u3030\ufe0f\npyLoad Flask Config - Access Control\u261d\ufe0f\nExample: target.com/render/info.html\ud83d\udcaf", "creation_timestamp": "2024-07-24T12:45:42.000000Z"}, {"uuid": "66454446-563f-4f35-841b-7d957f6ae0a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/3096", "content": "CVE-2024-21644\u3030\ufe0f\npyLoad Flask Config - Access Control\u261d\ufe0f\nExample: target.com/render/info.html\ud83d\udcaf", "creation_timestamp": "2024-07-24T12:45:42.000000Z"}, {"uuid": "9758b381-18a8-45ac-aa65-9fca1a84f80d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "seen", "source": "https://t.me/h0rn3t_sp1d3rs/494", "content": "\u2668\ufe0f YOU NEED ? \n\n\u2705 Advanced software to exploit cve-2024 vulnerabilities.\n\n\u27a1\ufe0f CVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE] \n\n\u27a1\ufe0f CVE-2024-1210 -\u00a0 Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE] \n\n\u27a1\ufe0f CVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC] \n\n\u27a1\ufe0f CVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW] \n \n\ud83d\uded2 Dm @h0rn3t_sp1d3r \u2708\ufe0f", "creation_timestamp": "2024-03-18T19:56:23.000000Z"}, {"uuid": "f0b98e07-8e79-4dd3-82e9-ef810e26d352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1122", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2025-03-05T14:04:07.000000Z"}, {"uuid": "2d746760-4e60-4dbf-ad42-aca6f6097e6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/12981", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-06-16T15:10:15.000000Z"}, {"uuid": "508d6f7d-b9cd-4fe1-8364-33e420492e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1457", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:50.000000Z"}, {"uuid": "0eaa0cbe-c8ff-4a63-ac83-429f32a7db4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/324", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]", "creation_timestamp": "2024-03-22T20:01:24.000000Z"}, {"uuid": "a2888248-a7b4-42bd-ad93-e8f6c675c922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1444", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-09-17T21:29:51.000000Z"}, {"uuid": "c19de2e0-c5d4-48e0-ac6f-d327dc1a058e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1404", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-03T19:16:45.000000Z"}, {"uuid": "4c4cada3-595b-4808-878a-8b47893ec0aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1397", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-03-19T16:05:55.000000Z"}, {"uuid": "9f810f59-2007-4f19-b559-ea0c9d66f448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1380", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-02-23T22:03:27.000000Z"}, {"uuid": "034e716c-61e7-4313-a9a3-848552208fd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1425", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-04-27T16:50:04.000000Z"}, {"uuid": "88c8bfc4-cb03-48b4-a1d8-4aef3c5aca35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1412", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-05-14T19:38:14.000000Z"}, {"uuid": "b023b167-7ff5-47f8-ae93-cf8c53b28cd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1625", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T11:01:27.000000Z"}, {"uuid": "32ee7425-1fbc-4e7f-8550-241495ed64e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "seen", "source": "https://t.me/ctinow/173387", "content": "https://ift.tt/RNeJ8hS\nCVE-2024-21644 | pyload up to 0.5.0b3.dev76 Flask Config access control", "creation_timestamp": "2024-01-25T11:36:52.000000Z"}, {"uuid": "dbf713e2-13d6-4ec5-9c79-917c950f5623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "seen", "source": "https://t.me/ctinow/164401", "content": "https://ift.tt/nswZxci\nCVE-2024-21644", "creation_timestamp": "2024-01-08T15:26:33.000000Z"}, {"uuid": "13beed28-f12e-4243-8529-a57017eb2eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21644", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/370", "content": "CVEploiter v1.0.0.0\n\nAdvanced software to exploit cve-2024 vulnerabilities.\n\nCVE-2024-25600 - Wordpress - Bricks &lt; Remote Code Execution [RCE]\n\nCVE-2024-1210 -  Wordpress - LearnDash LMS &lt; Sensitive Information Exposure [SIE]\n\nCVE-2024-21644 - pyLoad - Flask Config &lt; Access Control [AC]\n\nCVE-2024-0713 - Monitorr Services Configuration - Spawn Webshell [SW]\n\nEnjoy;", "creation_timestamp": "2024-11-20T22:32:26.000000Z"}]}