<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 08:39:16 +0000</lastBuildDate>
    <item>
      <title>46825320-6fd9-41f5-b632-1163c87b7061</title>
      <link>https://db.gcve.eu/sighting/46825320-6fd9-41f5-b632-1163c87b7061/export</link>
      <description>{"uuid": "46825320-6fd9-41f5-b632-1163c87b7061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/162221", "content": "https://ift.tt/UW3b6Dq\nCVE-2023-6600", "creation_timestamp": "2024-01-03T07:26:12.000000Z"}</description>
      <content:encoded>{"uuid": "46825320-6fd9-41f5-b632-1163c87b7061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/162221", "content": "https://ift.tt/UW3b6Dq\nCVE-2023-6600", "creation_timestamp": "2024-01-03T07:26:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/46825320-6fd9-41f5-b632-1163c87b7061/export</guid>
      <pubDate>Wed, 03 Jan 2024 07:26:12 +0000</pubDate>
    </item>
    <item>
      <title>bf5ab721-4c63-42dc-a36d-856eac7a02c7</title>
      <link>https://db.gcve.eu/sighting/bf5ab721-4c63-42dc-a36d-856eac7a02c7/export</link>
      <description>{"uuid": "bf5ab721-4c63-42dc-a36d-856eac7a02c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/cibsecurity/74279", "content": "\u203c\ufe0fCVE-2023-6600\u203c\ufe0f\n\nThe OMGF  GDPRDSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored CrossSite Scripting due to a missing capability check on the updatesettings function hooked via admininit in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject CrossSite Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:32:29.000000Z"}</description>
      <content:encoded>{"uuid": "bf5ab721-4c63-42dc-a36d-856eac7a02c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/cibsecurity/74279", "content": "\u203c\ufe0fCVE-2023-6600\u203c\ufe0f\n\nThe OMGF  GDPRDSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored CrossSite Scripting due to a missing capability check on the updatesettings function hooked via admininit in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject CrossSite Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:32:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf5ab721-4c63-42dc-a36d-856eac7a02c7/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:32:29 +0000</pubDate>
    </item>
    <item>
      <title>3daedcad-9155-43a0-ace4-bf67fa1d0b06</title>
      <link>https://db.gcve.eu/sighting/3daedcad-9155-43a0-ace4-bf67fa1d0b06/export</link>
      <description>{"uuid": "3daedcad-9155-43a0-ace4-bf67fa1d0b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/171761", "content": "https://ift.tt/As6SBgR\nCVE-2023-6600 | OMGF GDPR Compliant, Faster Google Fonts Plugin up to 5.7.9 on WordPress authorization", "creation_timestamp": "2024-01-23T08:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "3daedcad-9155-43a0-ace4-bf67fa1d0b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6600", "type": "seen", "source": "https://t.me/ctinow/171761", "content": "https://ift.tt/As6SBgR\nCVE-2023-6600 | OMGF GDPR Compliant, Faster Google Fonts Plugin up to 5.7.9 on WordPress authorization", "creation_timestamp": "2024-01-23T08:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3daedcad-9155-43a0-ace4-bf67fa1d0b06/export</guid>
      <pubDate>Tue, 23 Jan 2024 08:21:42 +0000</pubDate>
    </item>
  </channel>
</rss>
