<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T22:22:08.313398+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/62814a61-4797-4b48-bf31-eba1a9bb4172/export</id>
    <title>62814a61-4797-4b48-bf31-eba1a9bb4172</title>
    <updated>2026-05-05T22:22:08.655809+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "62814a61-4797-4b48-bf31-eba1a9bb4172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0328", "type": "seen", "source": "https://t.me/cibsecurity/59471", "content": "\u203c CVE-2023-0328 \u203c\n\nThe WPCode WordPress plugin before 2.0.7 does not have adequate privilege checks in place for several AJAX actions, only checking the nonce. This may lead to allowing any authenticated user who can edit posts to call the endpoints related to WPCode Library authentication (such as update and delete the auth key).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-06T16:12:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/62814a61-4797-4b48-bf31-eba1a9bb4172/export"/>
    <published>2023-03-06T16:12:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d32c47fd-da19-4c4f-874b-181cd0560613/export</id>
    <title>d32c47fd-da19-4c4f-874b-181cd0560613</title>
    <updated>2026-05-05T22:22:08.652342+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d32c47fd-da19-4c4f-874b-181cd0560613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0328", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6688", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-0328\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WPCode WordPress plugin before 2.0.7 does not have adequate privilege checks in place for several AJAX actions, only checking the nonce. This may lead to allowing any authenticated user who can edit posts to call the endpoints related to WPCode Library authentication (such as update and delete the auth key).\n\ud83d\udccf Published: 2023-03-06T13:33:58.773Z\n\ud83d\udccf Modified: 2025-03-06T15:14:23.559Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/3c4318a9-a3c5-409b-a52e-edd8583c3c43", "creation_timestamp": "2025-03-06T16:07:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d32c47fd-da19-4c4f-874b-181cd0560613/export"/>
    <published>2025-03-06T16:07:10+00:00</published>
  </entry>
</feed>
