<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 06:00:07 +0000</lastBuildDate>
    <item>
      <title>ea7aa9a2-43fb-4444-a1ce-f34300a9d42d</title>
      <link>https://db.gcve.eu/sighting/ea7aa9a2-43fb-4444-a1ce-f34300a9d42d/export</link>
      <description>{"uuid": "ea7aa9a2-43fb-4444-a1ce-f34300a9d42d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "https://t.me/cvedetector/1192", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6205 - PayPlus Payment Gateway WordPress SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-6205 \nPublished : July 19, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T08:40:53.000000Z"}</description>
      <content:encoded>{"uuid": "ea7aa9a2-43fb-4444-a1ce-f34300a9d42d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "https://t.me/cvedetector/1192", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6205 - PayPlus Payment Gateway WordPress SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-6205 \nPublished : July 19, 2024, 6:15 a.m. | 25\u00a0minutes ago \nDescription : The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T08:40:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ea7aa9a2-43fb-4444-a1ce-f34300a9d42d/export</guid>
      <pubDate>Fri, 19 Jul 2024 08:40:53 +0000</pubDate>
    </item>
    <item>
      <title>e6124d96-f379-46dd-9937-9bdcd667418f</title>
      <link>https://db.gcve.eu/sighting/e6124d96-f379-46dd-9937-9bdcd667418f/export</link>
      <description>{"uuid": "e6124d96-f379-46dd-9937-9bdcd667418f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/81", "content": "https://github.com/j3r1ch0123/CVE-2024-6205\n\nCVE-2024-6205\n\n#exploit #github #wordpress", "creation_timestamp": "2024-07-30T15:25:26.000000Z"}</description>
      <content:encoded>{"uuid": "e6124d96-f379-46dd-9937-9bdcd667418f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/81", "content": "https://github.com/j3r1ch0123/CVE-2024-6205\n\nCVE-2024-6205\n\n#exploit #github #wordpress", "creation_timestamp": "2024-07-30T15:25:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e6124d96-f379-46dd-9937-9bdcd667418f/export</guid>
      <pubDate>Tue, 30 Jul 2024 15:25:26 +0000</pubDate>
    </item>
    <item>
      <title>0671d633-bd1e-4bd1-9948-779d0d67da55</title>
      <link>https://db.gcve.eu/sighting/0671d633-bd1e-4bd1-9948-779d0d67da55/export</link>
      <description>{"uuid": "0671d633-bd1e-4bd1-9948-779d0d67da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0671d633-bd1e-4bd1-9948-779d0d67da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0671d633-bd1e-4bd1-9948-779d0d67da55/export</guid>
      <pubDate>Sat, 01 Feb 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>6e8357f9-7a8d-463e-8c8a-244375f98dfd</title>
      <link>https://db.gcve.eu/sighting/6e8357f9-7a8d-463e-8c8a-244375f98dfd/export</link>
      <description>{"uuid": "6e8357f9-7a8d-463e-8c8a-244375f98dfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "6e8357f9-7a8d-463e-8c8a-244375f98dfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6e8357f9-7a8d-463e-8c8a-244375f98dfd/export</guid>
      <pubDate>Thu, 15 May 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>7c434913-8b1b-46f8-8236-a805823f55d5</title>
      <link>https://db.gcve.eu/sighting/7c434913-8b1b-46f8-8236-a805823f55d5/export</link>
      <description>{"uuid": "7c434913-8b1b-46f8-8236-a805823f55d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "7c434913-8b1b-46f8-8236-a805823f55d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7c434913-8b1b-46f8-8236-a805823f55d5/export</guid>
      <pubDate>Thu, 26 Jun 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>2afec8ab-3790-4773-b0d8-c2b95ccdbc59</title>
      <link>https://db.gcve.eu/sighting/2afec8ab-3790-4773-b0d8-c2b95ccdbc59/export</link>
      <description>{"uuid": "2afec8ab-3790-4773-b0d8-c2b95ccdbc59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "2afec8ab-3790-4773-b0d8-c2b95ccdbc59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2afec8ab-3790-4773-b0d8-c2b95ccdbc59/export</guid>
      <pubDate>Wed, 30 Jul 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>f25db0f3-082d-4e19-bac8-50ba9a3e917a</title>
      <link>https://db.gcve.eu/sighting/f25db0f3-082d-4e19-bac8-50ba9a3e917a/export</link>
      <description>{"uuid": "f25db0f3-082d-4e19-bac8-50ba9a3e917a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "f25db0f3-082d-4e19-bac8-50ba9a3e917a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f25db0f3-082d-4e19-bac8-50ba9a3e917a/export</guid>
      <pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>0766bf67-80f9-4e2e-81b1-39f07266b645</title>
      <link>https://db.gcve.eu/sighting/0766bf67-80f9-4e2e-81b1-39f07266b645/export</link>
      <description>{"uuid": "0766bf67-80f9-4e2e-81b1-39f07266b645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0766bf67-80f9-4e2e-81b1-39f07266b645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0766bf67-80f9-4e2e-81b1-39f07266b645/export</guid>
      <pubDate>Sat, 14 Feb 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>b408ecf6-2d57-4a63-a095-0e39e1aaadc7</title>
      <link>https://db.gcve.eu/sighting/b408ecf6-2d57-4a63-a095-0e39e1aaadc7/export</link>
      <description>{"uuid": "b408ecf6-2d57-4a63-a095-0e39e1aaadc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "b408ecf6-2d57-4a63-a095-0e39e1aaadc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6205", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-27)", "content": "", "creation_timestamp": "2026-02-27T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b408ecf6-2d57-4a63-a095-0e39e1aaadc7/export</guid>
      <pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
