<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:59:47 +0000</lastBuildDate>
    <item>
      <title>8df87f7a-7e96-4e15-b69f-e6889d968d7e</title>
      <link>https://vulnerability.circl.lu/sighting/8df87f7a-7e96-4e15-b69f-e6889d968d7e/export</link>
      <description>{"uuid": "8df87f7a-7e96-4e15-b69f-e6889d968d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6477", "type": "seen", "source": "https://t.me/cvedetector/2383", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6477 - UsersWP WordPress Predictable File Download Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-6477 \nPublished : Aug. 3, 2024, 6:16 a.m. | 35\u00a0minutes ago \nDescription : The UsersWP  WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-03T09:14:36.000000Z"}</description>
      <content:encoded>{"uuid": "8df87f7a-7e96-4e15-b69f-e6889d968d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6477", "type": "seen", "source": "https://t.me/cvedetector/2383", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6477 - UsersWP WordPress Predictable File Download Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-6477 \nPublished : Aug. 3, 2024, 6:16 a.m. | 35\u00a0minutes ago \nDescription : The UsersWP  WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-03T09:14:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8df87f7a-7e96-4e15-b69f-e6889d968d7e/export</guid>
      <pubDate>Sat, 03 Aug 2024 09:14:36 +0000</pubDate>
    </item>
  </channel>
</rss>
