{"vulnerability": "cve-2024-6477", "sightings": [{"uuid": "8df87f7a-7e96-4e15-b69f-e6889d968d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6477", "type": "seen", "source": "https://t.me/cvedetector/2383", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6477 - UsersWP WordPress Predictable File Download Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-6477 \nPublished : Aug. 3, 2024, 6:16 a.m. | 35\u00a0minutes ago \nDescription : The UsersWP  WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-03T09:14:36.000000Z"}]}