{"vulnerability": "CVE-2024-31210", "sightings": [{"uuid": "8ea8f492-8b2d-4c2e-9f0e-c636ae53823f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1530/", "content": "", "creation_timestamp": "2024-11-19T06:00:00.000000Z"}, {"uuid": "a7ec91d2-d37f-49d8-98d3-475d4c90af85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7632", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367\nURL\uff1ahttps://github.com/Abo5/CVE-2024-31210\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-13T00:26:55.000000Z"}, {"uuid": "93a55b93-f7aa-4996-a709-0695c2b12af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "seen", "source": "https://t.me/DEATHSHOPOFFICIAL/221", "content": "\ud83d\udcccMirTu V3 - Mass MultiCMS Exploitor \ud83d\udccc\n\nFeatures:\u2705\n   \ud83d\udcdb22+ Exploits.\ud83d\udd34\n   \ud83d\udcdb13+ Backdoors ready to deploy.\u2705\n   \ud83d\udcdbAccurate Finder to locate vulnerabilities with precision.\ud83c\udf00\n   \ud83d\udcdbBest Paths for Shell/Backdoor/Uploaders.\ud83d\udca5\n   \ud83d\udcdbPrivate Shell Exploit-Method added for exclusive access.\u2744\ufe0f\n\n\ud83d\udc8eIncluded Exploits are similar to :\ud83d\udc8e\n   \ud83d\udd25CVE-2024-31210 \ud83d\udfe1\n   \ud83d\udd25File Manager Pro Plugin \ud83d\udca5\n   \ud83d\udd25CVE-2024-4577 \ud83c\udf00\n   \ud83d\udd25WooCommerce Payments Plugin \ud83c\udfa4\n   \ud83d\udd25WP File Manager Plugin \ud83d\udd50\n   \ud83d\udd25Popup Builder Plugin \ud83d\udca5\n   \ud83d\udd25Revolution Slider Plugin \ud83d\udca0\n   \ud83d\udd25WordPress 6.3.2 Core \u23f0\n   \ud83d\udd25Newsletter Plugin \ud83c\udf4f\n   \ud83d\udd25WP E-Signature Plugin \ud83d\udc53\n   \ud83d\udd25Advanced Custom Fields Plugin \ud83e\uddb6\n   \ud83d\udd25Duplicator Plugin \ud83e\udec1\n   \ud83d\udd25Elementor Pro Plugin \ud83d\udeb6\u200d\u2642\ufe0f\n   \ud83d\udd25WP Fastest Cache Plugin \ud83c\udf9f\n   \ud83d\udd25Slider Revolution Plugin \ud83d\udc83\n   \ud83d\udd25Contact Form 7 Plugin \ud83e\udde9\n   \ud83d\udd25WP Database Reset Plugin \ud83d\ude36\u200d\ud83c\udf2b\ufe0f\n\n\u26a0\ufe0fPerformance:\u26a0\ufe0f\n   \u2604\ufe0f Very Fast Requests - optimized for speed.\ud83c\udf00\n   \u2604\ufe0f Optimized Threading for seamless operation.\ud83c\udf00\n   \u2604\ufe0f Low CPU/RAM Usage - efficient and effective.\ud83e\udd14\n\n\ud83d\udc8eIt isn't subscription based its LifeTime Edition\ud83d\udc8e\n\n    Price:\ud83d\udcb2\ud83d\udcb2\n\nFor Purchase Contact: @Alace_bot\u2705", "creation_timestamp": "2024-09-01T08:11:46.000000Z"}, {"uuid": "37cad82e-3598-41f7-b93c-317e24e68cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "seen", "source": "Telegram/PdegKrJaPamfHxyVU1cCFcK1K_aPIiXCcJMQHkThDBnq4jxE", "content": "", "creation_timestamp": "2024-08-21T06:15:27.000000Z"}, {"uuid": "6feab1b8-e51b-48c4-afe3-b4d06b9ea5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "seen", "source": "https://t.me/ctinow/215190", "content": "https://ift.tt/y0p4AVD\nWordPress Remote Code Execution via Plugin Upload (CVE-2024-31210)", "creation_timestamp": "2024-04-15T18:21:11.000000Z"}, {"uuid": "ecd2f9ea-e512-454e-b1eb-f8bd907023da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "seen", "source": "Telegram/n32upgKdh0YO44KBbW-oOYuj3dFSmCH0Lbhaf22LxGTnsy-c", "content": "", "creation_timestamp": "2024-08-18T22:42:50.000000Z"}, {"uuid": "9aabefe5-0729-4e49-ac77-e1216aeb14b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31210", "type": "exploited", "source": "https://t.me/oxlogs/30", "content": "\ud83d\udcccMirTu V3 - Mass MultiCMS Exploitor \ud83d\udccc\n\nFeatures:\u2705\n   \ud83d\udcdb22+ Exploits.\ud83d\udd34\n   \ud83d\udcdb13+ Backdoors ready to deploy.\u2705\n   \ud83d\udcdbAccurate Finder to locate vulnerabilities with precision.\ud83c\udf00\n   \ud83d\udcdbBest Paths for Shell/Backdoor/Uploaders.\ud83d\udca5\n   \ud83d\udcdbPrivate Shell Exploit-Method added for exclusive access.\u2744\ufe0f\n\n\ud83d\udc8eIncluded Exploits are similar to :\ud83d\udc8e\n   \ud83d\udd25CVE-2024-31210 \ud83d\udfe1\n   \ud83d\udd25File Manager Pro Plugin \ud83d\udca5\n   \ud83d\udd25CVE-2024-4577 \ud83c\udf00\n   \ud83d\udd25WooCommerce Payments Plugin \ud83c\udfa4\n   \ud83d\udd25WP File Manager Plugin \ud83d\udd50\n   \ud83d\udd25Popup Builder Plugin \ud83d\udca5\n   \ud83d\udd25Revolution Slider Plugin \ud83d\udca0\n   \ud83d\udd25WordPress 6.3.2 Core \u23f0\n   \ud83d\udd25Newsletter Plugin \ud83c\udf4f\n   \ud83d\udd25WP E-Signature Plugin \ud83d\udc53\n   \ud83d\udd25Advanced Custom Fields Plugin \ud83e\uddb6\n   \ud83d\udd25Duplicator Plugin \ud83e\udec1\n   \ud83d\udd25Elementor Pro Plugin \ud83d\udeb6\u200d\u2642\ufe0f\n   \ud83d\udd25WP Fastest Cache Plugin \ud83c\udf9f\n   \ud83d\udd25Slider Revolution Plugin \ud83d\udc83\n   \ud83d\udd25Contact Form 7 Plugin \ud83e\udde9\n   \ud83d\udd25WP Database Reset Plugin \ud83d\ude36\u200d\ud83c\udf2b\ufe0f\n\n\u26a0\ufe0fPerformance:\u26a0\ufe0f\n   \u2604\ufe0f Very Fast Requests - optimized for speed.\ud83c\udf00\n   \u2604\ufe0f Optimized Threading for seamless operation.\ud83c\udf00\n   \u2604\ufe0f Low CPU/RAM Usage - efficient and effective.\ud83e\udd14\n\n\ud83d\udc8eIt isn't subscription based its LifeTime Edition\ud83d\udc8e\n\n    Price:\ud83d\udcb2\ud83d\udcb2\n\nFor Purchase Contact: @Alace_bot\u2705", "creation_timestamp": "2025-01-26T16:15:20.000000Z"}]}