<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 10:39:32 +0000</lastBuildDate>
    <item>
      <title>0041f49e-2b18-4f3a-8af1-4cfff065e68e</title>
      <link>https://db.gcve.eu/sighting/0041f49e-2b18-4f3a-8af1-4cfff065e68e/export</link>
      <description>{"uuid": "0041f49e-2b18-4f3a-8af1-4cfff065e68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24349", "type": "seen", "source": "https://t.me/cibsecurity/25436", "content": "\u203c CVE-2021-24349 \u203c\n\nThis Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-14T18:37:41.000000Z"}</description>
      <content:encoded>{"uuid": "0041f49e-2b18-4f3a-8af1-4cfff065e68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24349", "type": "seen", "source": "https://t.me/cibsecurity/25436", "content": "\u203c CVE-2021-24349 \u203c\n\nThis Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-14T18:37:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0041f49e-2b18-4f3a-8af1-4cfff065e68e/export</guid>
      <pubDate>Mon, 14 Jun 2021 18:37:41 +0000</pubDate>
    </item>
  </channel>
</rss>
