<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T16:19:52.476273+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d3058791-69cc-4c06-87bc-26b0427d12eb/export</id>
    <title>d3058791-69cc-4c06-87bc-26b0427d12eb</title>
    <updated>2026-05-02T16:19:52.814472+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d3058791-69cc-4c06-87bc-26b0427d12eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28782", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/8402", "content": "#exploit\n1. CVE-2023-34152 / CVE-2023-34151:\nShell Command Injection in ImageMagick / \nUndefined behaviors of casting double to size_t in svg, mvg, and other coders\nhttps://github.com/ImageMagick/ImageMagick/issues/6341\n]-&amp;gt; CVE-2023-34153:\u00a0Shell command injection vulnerability\nhttps://github.com/ImageMagick/ImageMagick/issues/6338\n\n2. CVE-2023-28782:\nPHP Object Injection Flaw in WordPress Gravity Forms Plugin\nhttps://securityonline.info/cve-2023-28782-php-object-injection-flaw-in-wordpress-gravity-forms-plugin-with-1-million-active-installations\n\n3. CVE-2023-3009:\nStored XSS on item name - Bypassing CVE-2023-2516 in TeamPass &amp;lt;3.0.9\nhttps://github.com/mnqazi/CVE-2023-3009", "creation_timestamp": "2023-06-01T13:16:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d3058791-69cc-4c06-87bc-26b0427d12eb/export"/>
    <published>2023-06-01T13:16:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0c2e7c45-2ba9-402a-830e-ab6ddc2f5579/export</id>
    <title>0c2e7c45-2ba9-402a-830e-ab6ddc2f5579</title>
    <updated>2026-05-02T16:19:52.814418+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0c2e7c45-2ba9-402a-830e-ab6ddc2f5579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28782", "type": "seen", "source": "https://t.me/ctinow/157117", "content": "https://ift.tt/s8vXjLA\nCVE-2023-28782", "creation_timestamp": "2023-12-20T16:23:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0c2e7c45-2ba9-402a-830e-ab6ddc2f5579/export"/>
    <published>2023-12-20T16:23:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/37584492-51b1-4891-9cf7-288b1ef77309/export</id>
    <title>37584492-51b1-4891-9cf7-288b1ef77309</title>
    <updated>2026-05-02T16:19:52.814340+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "37584492-51b1-4891-9cf7-288b1ef77309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28782", "type": "seen", "source": "https://t.me/arpsyndicate/2130", "content": "#ExploitObserverAlert\n\nCVE-2023-28782\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28782. Deserialization of Untrusted Data vulnerability in Rocketgenius Inc. Gravity Forms.This issue affects Gravity Forms: from n/a through 2.7.3.", "creation_timestamp": "2023-12-23T13:28:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/37584492-51b1-4891-9cf7-288b1ef77309/export"/>
    <published>2023-12-23T13:28:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6187ad1d-5da2-4610-969d-d977b07db286/export</id>
    <title>6187ad1d-5da2-4610-969d-d977b07db286</title>
    <updated>2026-05-02T16:19:52.813286+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6187ad1d-5da2-4610-969d-d977b07db286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28782", "type": "seen", "source": "https://t.me/ctinow/167856", "content": "https://ift.tt/xCJUvnl\nCVE-2023-28782 | Rocketgenius Gravity Forms Plugin up to 2.7.3 on WordPress deserialization", "creation_timestamp": "2024-01-13T15:21:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6187ad1d-5da2-4610-969d-d977b07db286/export"/>
    <published>2024-01-13T15:21:59+00:00</published>
  </entry>
</feed>
