<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 08:09:43 +0000</lastBuildDate>
    <item>
      <title>06e2e058-ebae-436c-8c5c-28828e7da427</title>
      <link>https://db.gcve.eu/sighting/06e2e058-ebae-436c-8c5c-28828e7da427/export</link>
      <description>{"uuid": "06e2e058-ebae-436c-8c5c-28828e7da427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6641", "type": "seen", "source": "https://t.me/cvedetector/5903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6641 - WordPress WP Hardening Security Feature Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-6641 \nPublished : Sept. 18, 2024, 6:15 a.m. | 38\u00a0minutes ago \nDescription : The WP Hardening \u2013 Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the \"Stop User Enumeration\" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T09:11:08.000000Z"}</description>
      <content:encoded>{"uuid": "06e2e058-ebae-436c-8c5c-28828e7da427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6641", "type": "seen", "source": "https://t.me/cvedetector/5903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6641 - WordPress WP Hardening Security Feature Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-6641 \nPublished : Sept. 18, 2024, 6:15 a.m. | 38\u00a0minutes ago \nDescription : The WP Hardening \u2013 Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the \"Stop User Enumeration\" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T09:11:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/06e2e058-ebae-436c-8c5c-28828e7da427/export</guid>
      <pubDate>Wed, 18 Sep 2024 09:11:08 +0000</pubDate>
    </item>
  </channel>
</rss>
