<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:47:45 +0000</lastBuildDate>
    <item>
      <title>442bac96-b957-47c1-8796-4f4c0b1681b5</title>
      <link>https://db.gcve.eu/sighting/442bac96-b957-47c1-8796-4f4c0b1681b5/export</link>
      <description>{"uuid": "442bac96-b957-47c1-8796-4f4c0b1681b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/cvedetector/6727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9265 - WordPress Echo RSS Feed Post Generator Plugin Admin Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-9265 \nPublished : Oct. 1, 2024, 9:15 a.m. | 34\u00a0minutes ago \nDescription : The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T11:54:18.000000Z"}</description>
      <content:encoded>{"uuid": "442bac96-b957-47c1-8796-4f4c0b1681b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/cvedetector/6727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9265 - WordPress Echo RSS Feed Post Generator Plugin Admin Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-9265 \nPublished : Oct. 1, 2024, 9:15 a.m. | 34\u00a0minutes ago \nDescription : The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T11:54:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/442bac96-b957-47c1-8796-4f4c0b1681b5/export</guid>
      <pubDate>Tue, 01 Oct 2024 11:54:18 +0000</pubDate>
    </item>
    <item>
      <title>29274eec-f851-4497-81ce-ab4a84368a44</title>
      <link>https://db.gcve.eu/sighting/29274eec-f851-4497-81ce-ab4a84368a44/export</link>
      <description>{"uuid": "29274eec-f851-4497-81ce-ab4a84368a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9265\n\ud83c\udfe2 Vendor: coderevolution\n\ud83d\udda5\ufe0f Product: echo_rss_feed_post_generator\n\ud83d\udd39 Description: The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.\n\ud83d\udccf Published: 2024-10-01T00:00:00Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/rss-feed-post-generator-echo/wordpress-echo-rss-feed-post-generator-plugin-5-4-6-unauthenticated-privilege-escalation-vulnerability", "creation_timestamp": "2025-02-08T23:20:33.000000Z"}</description>
      <content:encoded>{"uuid": "29274eec-f851-4497-81ce-ab4a84368a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9265", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-9265\n\ud83c\udfe2 Vendor: coderevolution\n\ud83d\udda5\ufe0f Product: echo_rss_feed_post_generator\n\ud83d\udd39 Description: The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.\n\ud83d\udccf Published: 2024-10-01T00:00:00Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/rss-feed-post-generator-echo/wordpress-echo-rss-feed-post-generator-plugin-5-4-6-unauthenticated-privilege-escalation-vulnerability", "creation_timestamp": "2025-02-08T23:20:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/29274eec-f851-4497-81ce-ab4a84368a44/export</guid>
      <pubDate>Sat, 08 Feb 2025 23:20:33 +0000</pubDate>
    </item>
  </channel>
</rss>
