<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 01:01:36 +0000</lastBuildDate>
    <item>
      <title>fafd807a-bb5c-43ea-b9ee-a7f96d8ab64d</title>
      <link>https://db.gcve.eu/sighting/fafd807a-bb5c-43ea-b9ee-a7f96d8ab64d/export</link>
      <description>{"uuid": "fafd807a-bb5c-43ea-b9ee-a7f96d8ab64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0550", "type": "seen", "source": "https://t.me/arpsyndicate/1699", "content": "#ExploitObserverAlert\n\nCVE-2023-0550\n\nDESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-0550. The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-12-11T04:34:27.000000Z"}</description>
      <content:encoded>{"uuid": "fafd807a-bb5c-43ea-b9ee-a7f96d8ab64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0550", "type": "seen", "source": "https://t.me/arpsyndicate/1699", "content": "#ExploitObserverAlert\n\nCVE-2023-0550\n\nDESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-0550. The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-12-11T04:34:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fafd807a-bb5c-43ea-b9ee-a7f96d8ab64d/export</guid>
      <pubDate>Mon, 11 Dec 2023 04:34:27 +0000</pubDate>
    </item>
  </channel>
</rss>
