<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T10:39:32.518941+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0041f49e-2b18-4f3a-8af1-4cfff065e68e/export</id>
    <title>0041f49e-2b18-4f3a-8af1-4cfff065e68e</title>
    <updated>2026-05-02T10:39:32.898071+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0041f49e-2b18-4f3a-8af1-4cfff065e68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24349", "type": "seen", "source": "https://t.me/cibsecurity/25436", "content": "\u203c CVE-2021-24349 \u203c\n\nThis Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-14T18:37:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0041f49e-2b18-4f3a-8af1-4cfff065e68e/export"/>
    <published>2021-06-14T18:37:41+00:00</published>
  </entry>
</feed>
