<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 07:11:14 +0000</lastBuildDate>
    <item>
      <title>4189603f-f638-4945-8867-b7d26167c774</title>
      <link>https://db.gcve.eu/sighting/4189603f-f638-4945-8867-b7d26167c774/export</link>
      <description>{"uuid": "4189603f-f638-4945-8867-b7d26167c774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24379", "type": "seen", "source": "https://t.me/arpsyndicate/2720", "content": "#ExploitObserverAlert\n\nCVE-2021-24379\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-24379. The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some Restriction modes, such as Cookie Restriction, IP Restrictions, Logged In User Restriction, however, they do not prevent such attack as they only check client side\n\nFIRST-EPSS: 0.001090000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2024-01-09T06:45:13.000000Z"}</description>
      <content:encoded>{"uuid": "4189603f-f638-4945-8867-b7d26167c774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24379", "type": "seen", "source": "https://t.me/arpsyndicate/2720", "content": "#ExploitObserverAlert\n\nCVE-2021-24379\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-24379. The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some Restriction modes, such as Cookie Restriction, IP Restrictions, Logged In User Restriction, however, they do not prevent such attack as they only check client side\n\nFIRST-EPSS: 0.001090000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2024-01-09T06:45:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4189603f-f638-4945-8867-b7d26167c774/export</guid>
      <pubDate>Tue, 09 Jan 2024 06:45:13 +0000</pubDate>
    </item>
  </channel>
</rss>
