<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 12 May 2026 04:07:46 +0000</lastBuildDate>
    <item>
      <title>db790a40-4454-4b7b-bfe2-36dc0d1b343f</title>
      <link>https://vulnerability.circl.lu/sighting/db790a40-4454-4b7b-bfe2-36dc0d1b343f/export</link>
      <description>{"uuid": "db790a40-4454-4b7b-bfe2-36dc0d1b343f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6448", "type": "seen", "source": "https://t.me/cvedetector/4299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6448 - Mollie Payments for WooCommerce Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6448 \nPublished : Aug. 28, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : The Mollie Payments for WooCommerce plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 7.7.0. This is due to the error reporting being enabled by default in multiple plugin files. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-28T06:46:15.000000Z"}</description>
      <content:encoded>{"uuid": "db790a40-4454-4b7b-bfe2-36dc0d1b343f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6448", "type": "seen", "source": "https://t.me/cvedetector/4299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6448 - Mollie Payments for WooCommerce Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6448 \nPublished : Aug. 28, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : The Mollie Payments for WooCommerce plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 7.7.0. This is due to the error reporting being enabled by default in multiple plugin files. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-28T06:46:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/db790a40-4454-4b7b-bfe2-36dc0d1b343f/export</guid>
      <pubDate>Wed, 28 Aug 2024 06:46:15 +0000</pubDate>
    </item>
  </channel>
</rss>
