<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T04:54:26.134612+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b2a204e5-9051-49fe-92a8-4d353611a141/export</id>
    <title>b2a204e5-9051-49fe-92a8-4d353611a141</title>
    <updated>2026-05-16T04:54:26.654687+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b2a204e5-9051-49fe-92a8-4d353611a141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52131", "type": "seen", "source": "https://t.me/ctinow/161161", "content": "https://ift.tt/W8h19cp\nCVE-2023-52131", "creation_timestamp": "2023-12-31T19:26:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b2a204e5-9051-49fe-92a8-4d353611a141/export"/>
    <published>2023-12-31T19:26:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/04dc813d-8419-4a01-80f6-5e1ccd6cddbf/export</id>
    <title>04dc813d-8419-4a01-80f6-5e1ccd6cddbf</title>
    <updated>2026-05-16T04:54:26.654601+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "04dc813d-8419-4a01-80f6-5e1ccd6cddbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52131", "type": "seen", "source": "https://t.me/cibsecurity/74081", "content": "\u203c\ufe0fCVE-2023-52131\u203c\ufe0f\n\nImproper Neutralization of Special Elements used in an SQL Command 'SQL Injection' vulnerability in WP Zinc Page Generator.This issue affects Page Generator from na through 1.7.1.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:33:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/04dc813d-8419-4a01-80f6-5e1ccd6cddbf/export"/>
    <published>2024-01-01T01:33:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8af8b00b-0544-4f5a-adc3-52842472db4f/export</id>
    <title>8af8b00b-0544-4f5a-adc3-52842472db4f</title>
    <updated>2026-05-16T04:54:26.652437+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8af8b00b-0544-4f5a-adc3-52842472db4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52131", "type": "seen", "source": "https://t.me/ctinow/171092", "content": "https://ift.tt/2LBN5Ey\nCVE-2023-52131 | WP Zinc Page Generator Plugin up to 1.7.1 on WordPress sql injection", "creation_timestamp": "2024-01-22T11:12:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8af8b00b-0544-4f5a-adc3-52842472db4f/export"/>
    <published>2024-01-22T11:12:08+00:00</published>
  </entry>
</feed>
