<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 01:23:44 +0000</lastBuildDate>
    <item>
      <title>c96e2248-e548-4b68-b56c-cc233046589b</title>
      <link>https://db.gcve.eu/sighting/c96e2248-e548-4b68-b56c-cc233046589b/export</link>
      <description>{"uuid": "c96e2248-e548-4b68-b56c-cc233046589b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7493", "type": "seen", "source": "https://t.me/cvedetector/4972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7493 - WordPress WPCOM Member Privilege Escalation Arbitrary User Role Update\", \n  \"Content\": \"CVE ID : CVE-2024-7493 \nPublished : Sept. 6, 2024, 2:15 p.m. | 45\u00a0minutes ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T17:26:24.000000Z"}</description>
      <content:encoded>{"uuid": "c96e2248-e548-4b68-b56c-cc233046589b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7493", "type": "seen", "source": "https://t.me/cvedetector/4972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7493 - WordPress WPCOM Member Privilege Escalation Arbitrary User Role Update\", \n  \"Content\": \"CVE ID : CVE-2024-7493 \nPublished : Sept. 6, 2024, 2:15 p.m. | 45\u00a0minutes ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T17:26:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c96e2248-e548-4b68-b56c-cc233046589b/export</guid>
      <pubDate>Fri, 06 Sep 2024 17:26:24 +0000</pubDate>
    </item>
  </channel>
</rss>
