<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:57:56 +0000</lastBuildDate>
    <item>
      <title>a766eefc-0a0d-4374-a365-64ab15604034</title>
      <link>https://db.gcve.eu/sighting/a766eefc-0a0d-4374-a365-64ab15604034/export</link>
      <description>{"uuid": "a766eefc-0a0d-4374-a365-64ab15604034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FQPQ-36Q8-XC95", "type": "seen", "source": "https://t.me/arpsyndicate/2247", "content": "#ExploitObserverAlert\n\nGHSA-fqpq-36q8-xc95\n\nDESCRIPTION: Exploit Observer has 2 entries related to GHSA-FQPQ-36Q8-XC95. The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)\n\nGHSS: 4.9", "creation_timestamp": "2023-12-29T12:14:28.000000Z"}</description>
      <content:encoded>{"uuid": "a766eefc-0a0d-4374-a365-64ab15604034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FQPQ-36Q8-XC95", "type": "seen", "source": "https://t.me/arpsyndicate/2247", "content": "#ExploitObserverAlert\n\nGHSA-fqpq-36q8-xc95\n\nDESCRIPTION: Exploit Observer has 2 entries related to GHSA-FQPQ-36Q8-XC95. The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)\n\nGHSS: 4.9", "creation_timestamp": "2023-12-29T12:14:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a766eefc-0a0d-4374-a365-64ab15604034/export</guid>
      <pubDate>Fri, 29 Dec 2023 12:14:28 +0000</pubDate>
    </item>
  </channel>
</rss>
