<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T07:11:12.131740+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d1a3cb1a-9c46-4726-91b5-1b31c4b30da4/export</id>
    <title>d1a3cb1a-9c46-4726-91b5-1b31c4b30da4</title>
    <updated>2026-05-06T07:11:12.420362+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d1a3cb1a-9c46-4726-91b5-1b31c4b30da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3999", "type": "seen", "source": "https://t.me/cibsecurity/69522", "content": "\u203c CVE-2023-3999 \u203c\n\nThe Waiting: One-click countdowns plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on its AJAX calls in versions up to, and including, 0.6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create and delete countdowns as well as manipulate other plugin settings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T12:13:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d1a3cb1a-9c46-4726-91b5-1b31c4b30da4/export"/>
    <published>2023-08-31T12:13:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0b2a4de5-86aa-4e7a-9c61-4d7f4e2af9c8/export</id>
    <title>0b2a4de5-86aa-4e7a-9c61-4d7f4e2af9c8</title>
    <updated>2026-05-06T07:11:12.420308+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0b2a4de5-86aa-4e7a-9c61-4d7f4e2af9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39992", "type": "seen", "source": "https://t.me/cibsecurity/69765", "content": "\u203c CVE-2023-39992 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in vCita.Com Online Booking &amp;amp; Scheduling Calendar for WordPress by vcita plugin &amp;lt;=\u00c2\u00a04.3.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T14:16:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0b2a4de5-86aa-4e7a-9c61-4d7f4e2af9c8/export"/>
    <published>2023-09-04T14:16:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f08fd169-a78f-40c1-bbed-3ed7a8a5cc41/export</id>
    <title>f08fd169-a78f-40c1-bbed-3ed7a8a5cc41</title>
    <updated>2026-05-06T07:11:12.420259+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f08fd169-a78f-40c1-bbed-3ed7a8a5cc41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39991", "type": "seen", "source": "https://t.me/cibsecurity/69771", "content": "\u203c CVE-2023-39991 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Blindside Networks BigBlueButton plugin &amp;lt;=\u00c2\u00a03.0.0-beta.4 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T14:16:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f08fd169-a78f-40c1-bbed-3ed7a8a5cc41/export"/>
    <published>2023-09-04T14:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c38102eb-6830-4570-a354-af88f1f50faa/export</id>
    <title>c38102eb-6830-4570-a354-af88f1f50faa</title>
    <updated>2026-05-06T07:11:12.420207+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c38102eb-6830-4570-a354-af88f1f50faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39999", "type": "seen", "source": "https://t.me/cibsecurity/72247", "content": "\u203c CVE-2023-39999 \u203c\n\nExposure of Sensitive Information to an Unauthorized Actor in WordPress\u00c2\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T16:29:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c38102eb-6830-4570-a354-af88f1f50faa/export"/>
    <published>2023-10-13T16:29:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/94795c0b-3dd3-4c44-9839-8d5823b14bb4/export</id>
    <title>94795c0b-3dd3-4c44-9839-8d5823b14bb4</title>
    <updated>2026-05-06T07:11:12.420159+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "94795c0b-3dd3-4c44-9839-8d5823b14bb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39995", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647168668769879", "content": "", "creation_timestamp": "2024-12-13T19:29:35.033451Z"}</content>
    <link href="https://db.gcve.eu/sighting/94795c0b-3dd3-4c44-9839-8d5823b14bb4/export"/>
    <published>2024-12-13T19:29:35.033451+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2e7ba171-66ff-428d-8f1e-78fbe2d7fbbf/export</id>
    <title>2e7ba171-66ff-428d-8f1e-78fbe2d7fbbf</title>
    <updated>2026-05-06T07:11:12.420105+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2e7ba171-66ff-428d-8f1e-78fbe2d7fbbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39996", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647227667249941", "content": "", "creation_timestamp": "2024-12-13T19:44:34.898859Z"}</content>
    <link href="https://db.gcve.eu/sighting/2e7ba171-66ff-428d-8f1e-78fbe2d7fbbf/export"/>
    <published>2024-12-13T19:44:34.898859+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fe793c48-3d27-413d-9c7c-7a62dac31b6b/export</id>
    <title>fe793c48-3d27-413d-9c7c-7a62dac31b6b</title>
    <updated>2026-05-06T07:11:12.420043+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fe793c48-3d27-413d-9c7c-7a62dac31b6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39997", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647227681540088", "content": "", "creation_timestamp": "2024-12-13T19:44:35.315056Z"}</content>
    <link href="https://db.gcve.eu/sighting/fe793c48-3d27-413d-9c7c-7a62dac31b6b/export"/>
    <published>2024-12-13T19:44:35.315056+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5998dc67-c3d1-49fb-ac9e-0f91823ea7bd/export</id>
    <title>5998dc67-c3d1-49fb-ac9e-0f91823ea7bd</title>
    <updated>2026-05-06T07:11:12.419988+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5998dc67-c3d1-49fb-ac9e-0f91823ea7bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39994", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerellcgoe2i", "content": "", "creation_timestamp": "2025-01-02T15:15:51.070700Z"}</content>
    <link href="https://db.gcve.eu/sighting/5998dc67-c3d1-49fb-ac9e-0f91823ea7bd/export"/>
    <published>2025-01-02T15:15:51.070700+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/780973e6-43ab-475f-afcc-dd47fe6c15a8/export</id>
    <title>780973e6-43ab-475f-afcc-dd47fe6c15a8</title>
    <updated>2026-05-06T07:11:12.419905+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "780973e6-43ab-475f-afcc-dd47fe6c15a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39994", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lergwvtoa32g", "content": "", "creation_timestamp": "2025-01-02T15:57:56.911738Z"}</content>
    <link href="https://db.gcve.eu/sighting/780973e6-43ab-475f-afcc-dd47fe6c15a8/export"/>
    <published>2025-01-02T15:57:56.911738+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e5e202bc-2f0d-4a36-853a-0dcd8204bbcb/export</id>
    <title>e5e202bc-2f0d-4a36-853a-0dcd8204bbcb</title>
    <updated>2026-05-06T07:11:12.416636+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e5e202bc-2f0d-4a36-853a-0dcd8204bbcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39994", "type": "seen", "source": "https://t.me/cvedetector/14165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-39994 - Repute InfoSystems ARMember Premium Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-39994 \nPublished : Jan. 2, 2025, 3:15 p.m. | 27\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Repute InfoSystems ARMember Premium allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ARMember Premium: from n/a through 5.9.2. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T16:46:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e5e202bc-2f0d-4a36-853a-0dcd8204bbcb/export"/>
    <published>2025-01-02T16:46:08+00:00</published>
  </entry>
</feed>
