<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 22:40:51 +0000</lastBuildDate>
    <item>
      <title>bb795c6c-bd15-45c1-92b2-7fa2318a5ee6</title>
      <link>https://db.gcve.eu/sighting/bb795c6c-bd15-45c1-92b2-7fa2318a5ee6/export</link>
      <description>{"uuid": "bb795c6c-bd15-45c1-92b2-7fa2318a5ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47059", "type": "seen", "source": "https://t.me/cvedetector/6033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47059 - WordPress Username Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47059 \nPublished : Sept. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.  \n  \nHowever when an incorrect username is provided alongside with a weak password, the application responds with \u2019Invalid credentials\u2019 notification.  \n  \nThis difference could be used to perform username enumeration. \nSeverity: 0.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T01:07:04.000000Z"}</description>
      <content:encoded>{"uuid": "bb795c6c-bd15-45c1-92b2-7fa2318a5ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47059", "type": "seen", "source": "https://t.me/cvedetector/6033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47059 - WordPress Username Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47059 \nPublished : Sept. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.  \n  \nHowever when an incorrect username is provided alongside with a weak password, the application responds with \u2019Invalid credentials\u2019 notification.  \n  \nThis difference could be used to perform username enumeration. \nSeverity: 0.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T01:07:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bb795c6c-bd15-45c1-92b2-7fa2318a5ee6/export</guid>
      <pubDate>Thu, 19 Sep 2024 01:07:04 +0000</pubDate>
    </item>
  </channel>
</rss>
