<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T06:00:07.308259+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ea7aa9a2-43fb-4444-a1ce-f34300a9d42d/export</id>
    <title>ea7aa9a2-43fb-4444-a1ce-f34300a9d42d</title>
    <updated>2026-05-02T06:00:07.756674+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ea7aa9a2-43fb-4444-a1ce-f34300a9d42d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "https://t.me/cvedetector/1192", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6205 - PayPlus Payment Gateway WordPress SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-6205 \nPublished : July 19, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T08:40:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ea7aa9a2-43fb-4444-a1ce-f34300a9d42d/export"/>
    <published>2024-07-19T08:40:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e6124d96-f379-46dd-9937-9bdcd667418f/export</id>
    <title>e6124d96-f379-46dd-9937-9bdcd667418f</title>
    <updated>2026-05-02T06:00:07.756625+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e6124d96-f379-46dd-9937-9bdcd667418f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/81", "content": "https://github.com/j3r1ch0123/CVE-2024-6205\n\nCVE-2024-6205\n\n#exploit #github #wordpress", "creation_timestamp": "2024-07-30T15:25:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e6124d96-f379-46dd-9937-9bdcd667418f/export"/>
    <published>2024-07-30T15:25:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0671d633-bd1e-4bd1-9948-779d0d67da55/export</id>
    <title>0671d633-bd1e-4bd1-9948-779d0d67da55</title>
    <updated>2026-05-02T06:00:07.756576+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0671d633-bd1e-4bd1-9948-779d0d67da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0671d633-bd1e-4bd1-9948-779d0d67da55/export"/>
    <published>2025-02-01T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6e8357f9-7a8d-463e-8c8a-244375f98dfd/export</id>
    <title>6e8357f9-7a8d-463e-8c8a-244375f98dfd</title>
    <updated>2026-05-02T06:00:07.756527+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6e8357f9-7a8d-463e-8c8a-244375f98dfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6e8357f9-7a8d-463e-8c8a-244375f98dfd/export"/>
    <published>2025-05-15T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7c434913-8b1b-46f8-8236-a805823f55d5/export</id>
    <title>7c434913-8b1b-46f8-8236-a805823f55d5</title>
    <updated>2026-05-02T06:00:07.756476+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7c434913-8b1b-46f8-8236-a805823f55d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7c434913-8b1b-46f8-8236-a805823f55d5/export"/>
    <published>2025-06-26T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2afec8ab-3790-4773-b0d8-c2b95ccdbc59/export</id>
    <title>2afec8ab-3790-4773-b0d8-c2b95ccdbc59</title>
    <updated>2026-05-02T06:00:07.756422+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2afec8ab-3790-4773-b0d8-c2b95ccdbc59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2afec8ab-3790-4773-b0d8-c2b95ccdbc59/export"/>
    <published>2025-07-30T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f25db0f3-082d-4e19-bac8-50ba9a3e917a/export</id>
    <title>f25db0f3-082d-4e19-bac8-50ba9a3e917a</title>
    <updated>2026-05-02T06:00:07.756361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f25db0f3-082d-4e19-bac8-50ba9a3e917a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f25db0f3-082d-4e19-bac8-50ba9a3e917a/export"/>
    <published>2025-11-11T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0766bf67-80f9-4e2e-81b1-39f07266b645/export</id>
    <title>0766bf67-80f9-4e2e-81b1-39f07266b645</title>
    <updated>2026-05-02T06:00:07.756271+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0766bf67-80f9-4e2e-81b1-39f07266b645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0766bf67-80f9-4e2e-81b1-39f07266b645/export"/>
    <published>2026-02-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b408ecf6-2d57-4a63-a095-0e39e1aaadc7/export</id>
    <title>b408ecf6-2d57-4a63-a095-0e39e1aaadc7</title>
    <updated>2026-05-02T06:00:07.754906+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b408ecf6-2d57-4a63-a095-0e39e1aaadc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b408ecf6-2d57-4a63-a095-0e39e1aaadc7/export"/>
    <published>2026-02-27T00:00:00+00:00</published>
  </entry>
</feed>
