<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 05:47:57 +0000</lastBuildDate>
    <item>
      <title>5d995c14-0196-4008-9a7c-05745c3eaccd</title>
      <link>https://vulnerability.circl.lu/sighting/5d995c14-0196-4008-9a7c-05745c3eaccd/export</link>
      <description>{"uuid": "5d995c14-0196-4008-9a7c-05745c3eaccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6750", "type": "seen", "source": "https://t.me/cvedetector/1536", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6750 - \"WordPress Social Auto Poster Unauthenticated Arbitrary Data Modification\"\", \n  \"Content\": \"CVE ID : CVE-2024-6750 \nPublished : July 24, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : The Social Auto Poster plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.3.14. This makes it possible for unauthenticated attackers to add, modify, or delete post meta and plugin options. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T05:46:46.000000Z"}</description>
      <content:encoded>{"uuid": "5d995c14-0196-4008-9a7c-05745c3eaccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6750", "type": "seen", "source": "https://t.me/cvedetector/1536", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6750 - \"WordPress Social Auto Poster Unauthenticated Arbitrary Data Modification\"\", \n  \"Content\": \"CVE ID : CVE-2024-6750 \nPublished : July 24, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : The Social Auto Poster plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.3.14. This makes it possible for unauthenticated attackers to add, modify, or delete post meta and plugin options. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T05:46:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d995c14-0196-4008-9a7c-05745c3eaccd/export</guid>
      <pubDate>Wed, 24 Jul 2024 05:46:46 +0000</pubDate>
    </item>
  </channel>
</rss>
