<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 03:30:43 +0000</lastBuildDate>
    <item>
      <title>637d5480-5b36-4569-a4d7-37ca2a26531f</title>
      <link>https://db.gcve.eu/sighting/637d5480-5b36-4569-a4d7-37ca2a26531f/export</link>
      <description>{"uuid": "637d5480-5b36-4569-a4d7-37ca2a26531f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24685", "type": "seen", "source": "https://t.me/cibsecurity/31533", "content": "\u203c CVE-2021-24685 \u203c\n\nThe Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-01T11:21:16.000000Z"}</description>
      <content:encoded>{"uuid": "637d5480-5b36-4569-a4d7-37ca2a26531f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24685", "type": "seen", "source": "https://t.me/cibsecurity/31533", "content": "\u203c CVE-2021-24685 \u203c\n\nThe Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-01T11:21:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/637d5480-5b36-4569-a4d7-37ca2a26531f/export</guid>
      <pubDate>Mon, 01 Nov 2021 11:21:16 +0000</pubDate>
    </item>
  </channel>
</rss>
