<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T01:37:34.962702+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3b411fcd-5b76-4491-83a0-bfdca4ce0110/export</id>
    <title>3b411fcd-5b76-4491-83a0-bfdca4ce0110</title>
    <updated>2026-05-24T01:37:35.500627+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3b411fcd-5b76-4491-83a0-bfdca4ce0110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/160699", "content": "https://ift.tt/mO1ku3h\nCVE-2023-50069", "creation_timestamp": "2023-12-29T22:26:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3b411fcd-5b76-4491-83a0-bfdca4ce0110/export"/>
    <published>2023-12-29T22:26:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b7847ac9-1a43-4ab6-82f5-24672430cee8/export</id>
    <title>b7847ac9-1a43-4ab6-82f5-24672430cee8</title>
    <updated>2026-05-24T01:37:35.500536+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b7847ac9-1a43-4ab6-82f5-24672430cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/cibsecurity/74007", "content": "\u203c\ufe0fCVE-2023-50069\u203c\ufe0f\n\nWireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored crosssite scripting SXSS through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b7847ac9-1a43-4ab6-82f5-24672430cee8/export"/>
    <published>2023-12-30T01:43:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/35c4aab6-58bb-4e67-8a4b-200f3ae501a7/export</id>
    <title>35c4aab6-58bb-4e67-8a4b-200f3ae501a7</title>
    <updated>2026-05-24T01:37:35.500455+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "35c4aab6-58bb-4e67-8a4b-200f3ae501a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/163809", "content": "https://ift.tt/lB6rSz3\nCVE-2023-50069 Exploit", "creation_timestamp": "2024-01-06T04:16:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/35c4aab6-58bb-4e67-8a4b-200f3ae501a7/export"/>
    <published>2024-01-06T04:16:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/29a726eb-990e-4feb-b559-238201a3a5b3/export</id>
    <title>29a726eb-990e-4feb-b559-238201a3a5b3</title>
    <updated>2026-05-24T01:37:35.500369+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "29a726eb-990e-4feb-b559-238201a3a5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/169328", "content": "https://ift.tt/sGjvB9a\nCVE-2023-5006", "creation_timestamp": "2024-01-17T16:26:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/29a726eb-990e-4feb-b559-238201a3a5b3/export"/>
    <published>2024-01-17T16:26:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d848001e-bab7-45b3-b05a-f92752d06815/export</id>
    <title>d848001e-bab7-45b3-b05a-f92752d06815</title>
    <updated>2026-05-24T01:37:35.500284+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d848001e-bab7-45b3-b05a-f92752d06815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/170900", "content": "https://ift.tt/IMbFUDE\nCVE-2023-50069 | WireMock up to 3.2.0.0 cross site scripting (Issue 51)", "creation_timestamp": "2024-01-21T18:46:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d848001e-bab7-45b3-b05a-f92752d06815/export"/>
    <published>2024-01-21T18:46:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8e48645e-fc0e-484e-ae8b-0c914872ba7f/export</id>
    <title>8e48645e-fc0e-484e-ae8b-0c914872ba7f</title>
    <updated>2026-05-24T01:37:35.500197+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8e48645e-fc0e-484e-ae8b-0c914872ba7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/173082", "content": "https://ift.tt/g3AsmDx\nCVE-2023-5006 Exploit", "creation_timestamp": "2024-01-24T21:16:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8e48645e-fc0e-484e-ae8b-0c914872ba7f/export"/>
    <published>2024-01-24T21:16:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f37012f4-7ff6-4356-b058-f950fcba78b3/export</id>
    <title>f37012f4-7ff6-4356-b058-f950fcba78b3</title>
    <updated>2026-05-24T01:37:35.500096+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f37012f4-7ff6-4356-b058-f950fcba78b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/181570", "content": "https://ift.tt/sKHxO4p\nCVE-2023-50061", "creation_timestamp": "2024-02-08T19:22:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f37012f4-7ff6-4356-b058-f950fcba78b3/export"/>
    <published>2024-02-08T19:22:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d0f4b797-e893-4def-b573-0e308f3cc656/export</id>
    <title>d0f4b797-e893-4def-b573-0e308f3cc656</title>
    <updated>2026-05-24T01:37:35.499955+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d0f4b797-e893-4def-b573-0e308f3cc656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/198377", "content": "https://ift.tt/XCIWFRz\nCVE-2023-50061 | Op'art Easy Redirect Module 1.3.8/1.3.9/1.3.10/1.3.11/1.3.12 on PrestaShop hookActionDispatcher sql injection", "creation_timestamp": "2024-03-02T14:46:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d0f4b797-e893-4def-b573-0e308f3cc656/export"/>
    <published>2024-03-02T14:46:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dcb69d7b-f0e3-45e7-b09f-e30fb526c341/export</id>
    <title>dcb69d7b-f0e3-45e7-b09f-e30fb526c341</title>
    <updated>2026-05-24T01:37:35.497426+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dcb69d7b-f0e3-45e7-b09f-e30fb526c341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5006\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request.\n\ud83d\udccf Published: 2024-01-17T14:31:48.144Z\n\ud83d\udccf Modified: 2025-06-11T17:04:46.980Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8", "creation_timestamp": "2025-06-11T17:34:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dcb69d7b-f0e3-45e7-b09f-e30fb526c341/export"/>
    <published>2025-06-11T17:34:33+00:00</published>
  </entry>
</feed>
