<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T22:44:45.244955+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/13ddfa8f-205a-4170-9dd0-b3df0e167cbb/export</id>
    <title>13ddfa8f-205a-4170-9dd0-b3df0e167cbb</title>
    <updated>2026-05-19T22:44:45.639742+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "13ddfa8f-205a-4170-9dd0-b3df0e167cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24831", "type": "seen", "source": "https://t.me/cibsecurity/34856", "content": "\u203c CVE-2021-24831 \u203c\n\nAll AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-03T16:44:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/13ddfa8f-205a-4170-9dd0-b3df0e167cbb/export"/>
    <published>2022-01-03T16:44:07+00:00</published>
  </entry>
</feed>
