<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T08:39:17.185751+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/46825320-6fd9-41f5-b632-1163c87b7061/export</id>
    <title>46825320-6fd9-41f5-b632-1163c87b7061</title>
    <updated>2026-05-17T08:39:17.568704+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "46825320-6fd9-41f5-b632-1163c87b7061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/162221", "content": "https://ift.tt/UW3b6Dq\nCVE-2023-6600", "creation_timestamp": "2024-01-03T07:26:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/46825320-6fd9-41f5-b632-1163c87b7061/export"/>
    <published>2024-01-03T07:26:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf5ab721-4c63-42dc-a36d-856eac7a02c7/export</id>
    <title>bf5ab721-4c63-42dc-a36d-856eac7a02c7</title>
    <updated>2026-05-17T08:39:17.568394+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf5ab721-4c63-42dc-a36d-856eac7a02c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/cibsecurity/74279", "content": "\u203c\ufe0fCVE-2023-6600\u203c\ufe0f\n\nThe OMGF  GDPRDSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored CrossSite Scripting due to a missing capability check on the updatesettings function hooked via admininit in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject CrossSite Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:32:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf5ab721-4c63-42dc-a36d-856eac7a02c7/export"/>
    <published>2024-01-04T01:32:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3daedcad-9155-43a0-ace4-bf67fa1d0b06/export</id>
    <title>3daedcad-9155-43a0-ace4-bf67fa1d0b06</title>
    <updated>2026-05-17T08:39:17.565763+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3daedcad-9155-43a0-ace4-bf67fa1d0b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/171761", "content": "https://ift.tt/As6SBgR\nCVE-2023-6600 | OMGF GDPR Compliant, Faster Google Fonts Plugin up to 5.7.9 on WordPress authorization", "creation_timestamp": "2024-01-23T08:21:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3daedcad-9155-43a0-ace4-bf67fa1d0b06/export"/>
    <published>2024-01-23T08:21:42+00:00</published>
  </entry>
</feed>
