<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-13T06:10:01.764384+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/637d5480-5b36-4569-a4d7-37ca2a26531f/export</id>
    <title>637d5480-5b36-4569-a4d7-37ca2a26531f</title>
    <updated>2026-05-13T06:10:02.121067+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "637d5480-5b36-4569-a4d7-37ca2a26531f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24685", "type": "seen", "source": "https://t.me/cibsecurity/31533", "content": "\u203c CVE-2021-24685 \u203c\n\nThe Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-01T11:21:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/637d5480-5b36-4569-a4d7-37ca2a26531f/export"/>
    <published>2021-11-01T11:21:16+00:00</published>
  </entry>
</feed>
