<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T13:09:44.697274+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1daf5c5c-c6c2-4a73-a8af-e7c48acbbf62/export</id>
    <title>1daf5c5c-c6c2-4a73-a8af-e7c48acbbf62</title>
    <updated>2026-05-01T13:09:44.927440+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1daf5c5c-c6c2-4a73-a8af-e7c48acbbf62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48035", "type": "seen", "source": "https://t.me/cvedetector/8077", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48035 - Takayuki Imanishi ACF Images Search And Insert Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48035 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Takayuki Imanishi ACF Images Search And Insert allows Upload a Web Shell to a Web Server.This issue affects ACF Images Search And Insert: from n/a through 1.1.4. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1daf5c5c-c6c2-4a73-a8af-e7c48acbbf62/export"/>
    <published>2024-10-16T17:13:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9153f486-9745-4666-b095-feb08c655251/export</id>
    <title>9153f486-9745-4666-b095-feb08c655251</title>
    <updated>2026-05-01T13:09:44.927389+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9153f486-9745-4666-b095-feb08c655251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48034", "type": "seen", "source": "https://t.me/cvedetector/8079", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48034 - Fliperrr Team Creates 3D Flipbook, PDF Flipbook Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48034 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Fliperrr Team Creates 3D Flipbook, PDF Flipbook allows Upload a Web Shell to a Web Server.This issue affects Creates 3D Flipbook, PDF Flipbook: from n/a through 1.2. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9153f486-9745-4666-b095-feb08c655251/export"/>
    <published>2024-10-16T17:13:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ccf1c689-92a5-40a7-a70c-a10cfeb73a45/export</id>
    <title>ccf1c689-92a5-40a7-a70c-a10cfeb73a45</title>
    <updated>2026-05-01T13:09:44.927337+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ccf1c689-92a5-40a7-a70c-a10cfeb73a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48030", "type": "seen", "source": "https://t.me/cvedetector/8084", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48030 - Gabriele Valenti Telecash Ricaricaweb Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48030 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Gabriele Valenti Telecash Ricaricaweb allows Object Injection.This issue affects Telecash Ricaricaweb: from n/a through 2.2. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ccf1c689-92a5-40a7-a70c-a10cfeb73a45/export"/>
    <published>2024-10-16T17:13:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1b0468a6-e251-4b1d-9ae1-38b24cd25db8/export</id>
    <title>1b0468a6-e251-4b1d-9ae1-38b24cd25db8</title>
    <updated>2026-05-01T13:09:44.927286+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1b0468a6-e251-4b1d-9ae1-38b24cd25db8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48038", "type": "seen", "source": "https://t.me/cvedetector/8167", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48038 - Hans Matzen wp-Monalisa CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48038 \nPublished : Oct. 17, 2024, 12:15 p.m. | 40\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Hans Matzen wp-Monalisa allows Cross Site Request Forgery.This issue affects wp-Monalisa: from n/a through 6.4. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T14:58:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1b0468a6-e251-4b1d-9ae1-38b24cd25db8/export"/>
    <published>2024-10-17T14:58:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0a83b249-a457-4ec9-8fa8-ec9bca1a99f2/export</id>
    <title>0a83b249-a457-4ec9-8fa8-ec9bca1a99f2</title>
    <updated>2026-05-01T13:09:44.927234+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0a83b249-a457-4ec9-8fa8-ec9bca1a99f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48031", "type": "seen", "source": "https://t.me/cvedetector/8175", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48031 - \"Sumit Surai Featured Posts with Multiple Custom Groups CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-48031 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Cross Site Request Forgery.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0a83b249-a457-4ec9-8fa8-ec9bca1a99f2/export"/>
    <published>2024-10-17T15:48:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/83770816-7acb-423a-a86b-69d41491643e/export</id>
    <title>83770816-7acb-423a-a86b-69d41491643e</title>
    <updated>2026-05-01T13:09:44.927180+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "83770816-7acb-423a-a86b-69d41491643e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48032", "type": "seen", "source": "https://t.me/cvedetector/8176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48032 - Sumit Surai Featured Posts with Multiple Custom Groups Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-48032 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Reflected XSS.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/83770816-7acb-423a-a86b-69d41491643e/export"/>
    <published>2024-10-17T15:48:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9e0bd19e-1b78-4693-a899-9e28722b8321/export</id>
    <title>9e0bd19e-1b78-4693-a899-9e28722b8321</title>
    <updated>2026-05-01T13:09:44.927120+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9e0bd19e-1b78-4693-a899-9e28722b8321", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48036", "type": "seen", "source": "https://t.me/cvedetector/8177", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48036 - SKT Blocks Gutenberg Based Page Builder Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-48036 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS.This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9e0bd19e-1b78-4693-a899-9e28722b8321/export"/>
    <published>2024-10-17T15:48:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1636f51c-3385-4dda-9a29-0991c95be374/export</id>
    <title>1636f51c-3385-4dda-9a29-0991c95be374</title>
    <updated>2026-05-01T13:09:44.927060+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1636f51c-3385-4dda-9a29-0991c95be374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48037", "type": "seen", "source": "https://t.me/cvedetector/8178", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48037 - A WP Life Contact Form Widget CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48037 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Contact Form Widget allows Cross Site Request Forgery.This issue affects Contact Form Widget: from n/a through 1.4.2. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1636f51c-3385-4dda-9a29-0991c95be374/export"/>
    <published>2024-10-17T15:48:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a33facd4-27c4-46e3-8358-d94a7fb6eacc/export</id>
    <title>a33facd4-27c4-46e3-8358-d94a7fb6eacc</title>
    <updated>2026-05-01T13:09:44.926976+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a33facd4-27c4-46e3-8358-d94a7fb6eacc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48039", "type": "seen", "source": "https://t.me/cvedetector/9591", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48039 - CubeWP All-in-One Dynamic Content Framework Missing Authorization\", \n  \"Content\": \"CVE ID : CVE-2024-48039 \nPublished : Nov. 1, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : Missing Authorization vulnerability in CubeWP CubeWP \u2013 All-in-One Dynamic Content Framework allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CubeWP \u2013 All-in-One Dynamic Content Framework: from n/a through 1.1.15. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T17:01:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a33facd4-27c4-46e3-8358-d94a7fb6eacc/export"/>
    <published>2024-11-01T17:01:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/09502b16-40f0-4a70-899b-27d354bd648c/export</id>
    <title>09502b16-40f0-4a70-899b-27d354bd648c</title>
    <updated>2026-05-01T13:09:44.925861+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "09502b16-40f0-4a70-899b-27d354bd648c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4803", "type": "seen", "source": "Telegram/woo8cItA7J7dg_ysyxEcDt2X1PwpuVFYaOEb1DGpm9Nz1Iop", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/09502b16-40f0-4a70-899b-27d354bd648c/export"/>
    <published>2025-02-14T10:03:11+00:00</published>
  </entry>
</feed>
