<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T02:26:08.714319+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3b32ff20-167f-46c5-8368-4ae23c342828/export</id>
    <title>3b32ff20-167f-46c5-8368-4ae23c342828</title>
    <updated>2026-05-11T02:26:09.178012+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3b32ff20-167f-46c5-8368-4ae23c342828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47844", "type": "seen", "source": "https://t.me/ctinow/157623", "content": "https://ift.tt/3Uf5oRQ\nCVE-2023-47844 | Lim Kai Yang Grab &amp;amp; Save Plugin up to 1.0.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T11:37:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3b32ff20-167f-46c5-8368-4ae23c342828/export"/>
    <published>2023-12-21T11:37:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/902644ea-04ba-4425-8a50-16c67cc2bbb8/export</id>
    <title>902644ea-04ba-4425-8a50-16c67cc2bbb8</title>
    <updated>2026-05-11T02:26:09.177962+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "902644ea-04ba-4425-8a50-16c67cc2bbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47848", "type": "seen", "source": "https://t.me/ctinow/157633", "content": "https://ift.tt/EwCv2ZF\nCVE-2023-47848 | Tainacan Plugin up to 0.20.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T12:06:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/902644ea-04ba-4425-8a50-16c67cc2bbb8/export"/>
    <published>2023-12-21T12:06:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e506b61c-6460-49a6-bcea-af99c16a1344/export</id>
    <title>e506b61c-6460-49a6-bcea-af99c16a1344</title>
    <updated>2026-05-11T02:26:09.177911+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e506b61c-6460-49a6-bcea-af99c16a1344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/ctinow/160404", "content": "https://ift.tt/fZJ6IOT\nCVE-2023-47840", "creation_timestamp": "2023-12-29T10:26:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e506b61c-6460-49a6-bcea-af99c16a1344/export"/>
    <published>2023-12-29T10:26:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/56556e39-c437-444c-b481-dcc63f1dfcdf/export</id>
    <title>56556e39-c437-444c-b481-dcc63f1dfcdf</title>
    <updated>2026-05-11T02:26:09.177855+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "56556e39-c437-444c-b481-dcc63f1dfcdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/cibsecurity/73919", "content": "\u203c\ufe0fCVE-2023-47840\u203c\ufe0f\n\nImproper Control of Generation of Code 'Code Injection' vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons from na through 1.5.2.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:36:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/56556e39-c437-444c-b481-dcc63f1dfcdf/export"/>
    <published>2023-12-30T01:36:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/765107a2-2260-4d2d-9e2a-80d2e8669d78/export</id>
    <title>765107a2-2260-4d2d-9e2a-80d2e8669d78</title>
    <updated>2026-05-11T02:26:09.177798+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "765107a2-2260-4d2d-9e2a-80d2e8669d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/arpsyndicate/2282", "content": "#ExploitObserverAlert\n\nCVE-2023-47840\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47840. Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.", "creation_timestamp": "2023-12-31T02:55:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/765107a2-2260-4d2d-9e2a-80d2e8669d78/export"/>
    <published>2023-12-31T02:55:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e684c100-8073-41b0-9761-ef942b40c8aa/export</id>
    <title>e684c100-8073-41b0-9761-ef942b40c8aa</title>
    <updated>2026-05-11T02:26:09.177744+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e684c100-8073-41b0-9761-ef942b40c8aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47841", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638707920749", "content": "", "creation_timestamp": "2024-12-09T11:31:17.385819Z"}</content>
    <link href="https://db.gcve.eu/sighting/e684c100-8073-41b0-9761-ef942b40c8aa/export"/>
    <published>2024-12-09T11:31:17.385819+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5/export</id>
    <title>7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5</title>
    <updated>2026-05-11T02:26:09.177684+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638721668524", "content": "", "creation_timestamp": "2024-12-09T11:31:17.554882Z"}</content>
    <link href="https://db.gcve.eu/sighting/7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5/export"/>
    <published>2024-12-09T11:31:17.554882+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f255533-3982-477e-8a19-55b97a418f29/export</id>
    <title>5f255533-3982-477e-8a19-55b97a418f29</title>
    <updated>2026-05-11T02:26:09.177598+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f255533-3982-477e-8a19-55b97a418f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638736001369", "content": "", "creation_timestamp": "2024-12-09T11:31:17.914505Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f255533-3982-477e-8a19-55b97a418f29/export"/>
    <published>2024-12-09T11:31:17.914505+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/19f27e02-2e1c-4a0f-a591-a16e40b10bb1/export</id>
    <title>19f27e02-2e1c-4a0f-a591-a16e40b10bb1</title>
    <updated>2026-05-11T02:26:09.176290+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "19f27e02-2e1c-4a0f-a591-a16e40b10bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4784", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpnxahu2c", "content": "", "creation_timestamp": "2025-02-11T02:16:56.469208Z"}</content>
    <link href="https://db.gcve.eu/sighting/19f27e02-2e1c-4a0f-a591-a16e40b10bb1/export"/>
    <published>2025-02-11T02:16:56.469208+00:00</published>
  </entry>
</feed>
