<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 12:48:49 +0000</lastBuildDate>
    <item>
      <title>a0d69cf5-bf17-40b9-91dd-28e82d287e2d</title>
      <link>https://vulnerability.circl.lu/sighting/a0d69cf5-bf17-40b9-91dd-28e82d287e2d/export</link>
      <description>{"uuid": "a0d69cf5-bf17-40b9-91dd-28e82d287e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6328", "type": "seen", "source": "https://t.me/cvedetector/718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6328 - The MStore API \u2013 Create Native Android &amp;amp; iOS Apps\", \n  \"Content\": \"CVE ID : CVE-2024-6328 \nPublished : July 12, 2024, 11:15 a.m. | 17\u00a0minutes ago \nDescription : The MStore API \u2013 Create Native Android &amp;amp; iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.14.7. This is due to insufficient verification on the 'phone' parameter of the 'firebase_sms_login' and 'firebase_sms_login_v2' functions. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email address or phone number.  Additionally, if a new email address is supplied, a new user account is created with the default role, even if registration is disabled. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T13:34:19.000000Z"}</description>
      <content:encoded>{"uuid": "a0d69cf5-bf17-40b9-91dd-28e82d287e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6328", "type": "seen", "source": "https://t.me/cvedetector/718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6328 - The MStore API \u2013 Create Native Android &amp;amp; iOS Apps\", \n  \"Content\": \"CVE ID : CVE-2024-6328 \nPublished : July 12, 2024, 11:15 a.m. | 17\u00a0minutes ago \nDescription : The MStore API \u2013 Create Native Android &amp;amp; iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.14.7. This is due to insufficient verification on the 'phone' parameter of the 'firebase_sms_login' and 'firebase_sms_login_v2' functions. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email address or phone number.  Additionally, if a new email address is supplied, a new user account is created with the default role, even if registration is disabled. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T13:34:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a0d69cf5-bf17-40b9-91dd-28e82d287e2d/export</guid>
      <pubDate>Fri, 12 Jul 2024 13:34:19 +0000</pubDate>
    </item>
  </channel>
</rss>
