<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 03:46:35 +0000</lastBuildDate>
    <item>
      <title>013332a0-04c7-4c6f-a8ee-abf68723045e</title>
      <link>https://db.gcve.eu/sighting/013332a0-04c7-4c6f-a8ee-abf68723045e/export</link>
      <description>{"uuid": "013332a0-04c7-4c6f-a8ee-abf68723045e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9829", "type": "seen", "source": "https://t.me/cvedetector/8673", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9829 - WordPress Download Plugin Unauthenticated Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-9829 \nPublished : Oct. 23, 2024, 6:15 a.m. | 38\u00a0minutes ago \nDescription : The Download Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the 'dpwap_handle_download_user' and 'dpwap_handle_download_comment' functions in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download any comment, and download metadata for any user including user PII and sensitive information including username, email, hashed passwords and application passwords, session token information and more depending on set up and additional plugins installed. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-23T09:01:34.000000Z"}</description>
      <content:encoded>{"uuid": "013332a0-04c7-4c6f-a8ee-abf68723045e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9829", "type": "seen", "source": "https://t.me/cvedetector/8673", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9829 - WordPress Download Plugin Unauthenticated Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-9829 \nPublished : Oct. 23, 2024, 6:15 a.m. | 38\u00a0minutes ago \nDescription : The Download Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the 'dpwap_handle_download_user' and 'dpwap_handle_download_comment' functions in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download any comment, and download metadata for any user including user PII and sensitive information including username, email, hashed passwords and application passwords, session token information and more depending on set up and additional plugins installed. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-23T09:01:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/013332a0-04c7-4c6f-a8ee-abf68723045e/export</guid>
      <pubDate>Wed, 23 Oct 2024 09:01:34 +0000</pubDate>
    </item>
  </channel>
</rss>
