<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 00:21:27 +0000</lastBuildDate>
    <item>
      <title>3b32ff20-167f-46c5-8368-4ae23c342828</title>
      <link>https://db.gcve.eu/sighting/3b32ff20-167f-46c5-8368-4ae23c342828/export</link>
      <description>{"uuid": "3b32ff20-167f-46c5-8368-4ae23c342828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47844", "type": "seen", "source": "https://t.me/ctinow/157623", "content": "https://ift.tt/3Uf5oRQ\nCVE-2023-47844 | Lim Kai Yang Grab &amp;amp; Save Plugin up to 1.0.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T11:37:06.000000Z"}</description>
      <content:encoded>{"uuid": "3b32ff20-167f-46c5-8368-4ae23c342828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47844", "type": "seen", "source": "https://t.me/ctinow/157623", "content": "https://ift.tt/3Uf5oRQ\nCVE-2023-47844 | Lim Kai Yang Grab &amp;amp; Save Plugin up to 1.0.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T11:37:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b32ff20-167f-46c5-8368-4ae23c342828/export</guid>
      <pubDate>Thu, 21 Dec 2023 11:37:06 +0000</pubDate>
    </item>
    <item>
      <title>902644ea-04ba-4425-8a50-16c67cc2bbb8</title>
      <link>https://db.gcve.eu/sighting/902644ea-04ba-4425-8a50-16c67cc2bbb8/export</link>
      <description>{"uuid": "902644ea-04ba-4425-8a50-16c67cc2bbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47848", "type": "seen", "source": "https://t.me/ctinow/157633", "content": "https://ift.tt/EwCv2ZF\nCVE-2023-47848 | Tainacan Plugin up to 0.20.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T12:06:23.000000Z"}</description>
      <content:encoded>{"uuid": "902644ea-04ba-4425-8a50-16c67cc2bbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47848", "type": "seen", "source": "https://t.me/ctinow/157633", "content": "https://ift.tt/EwCv2ZF\nCVE-2023-47848 | Tainacan Plugin up to 0.20.4 on WordPress cross site scripting", "creation_timestamp": "2023-12-21T12:06:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/902644ea-04ba-4425-8a50-16c67cc2bbb8/export</guid>
      <pubDate>Thu, 21 Dec 2023 12:06:23 +0000</pubDate>
    </item>
    <item>
      <title>e506b61c-6460-49a6-bcea-af99c16a1344</title>
      <link>https://db.gcve.eu/sighting/e506b61c-6460-49a6-bcea-af99c16a1344/export</link>
      <description>{"uuid": "e506b61c-6460-49a6-bcea-af99c16a1344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/ctinow/160404", "content": "https://ift.tt/fZJ6IOT\nCVE-2023-47840", "creation_timestamp": "2023-12-29T10:26:40.000000Z"}</description>
      <content:encoded>{"uuid": "e506b61c-6460-49a6-bcea-af99c16a1344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/ctinow/160404", "content": "https://ift.tt/fZJ6IOT\nCVE-2023-47840", "creation_timestamp": "2023-12-29T10:26:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e506b61c-6460-49a6-bcea-af99c16a1344/export</guid>
      <pubDate>Fri, 29 Dec 2023 10:26:40 +0000</pubDate>
    </item>
    <item>
      <title>56556e39-c437-444c-b481-dcc63f1dfcdf</title>
      <link>https://db.gcve.eu/sighting/56556e39-c437-444c-b481-dcc63f1dfcdf/export</link>
      <description>{"uuid": "56556e39-c437-444c-b481-dcc63f1dfcdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/cibsecurity/73919", "content": "\u203c\ufe0fCVE-2023-47840\u203c\ufe0f\n\nImproper Control of Generation of Code 'Code Injection' vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons from na through 1.5.2.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:36:10.000000Z"}</description>
      <content:encoded>{"uuid": "56556e39-c437-444c-b481-dcc63f1dfcdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/cibsecurity/73919", "content": "\u203c\ufe0fCVE-2023-47840\u203c\ufe0f\n\nImproper Control of Generation of Code 'Code Injection' vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons from na through 1.5.2.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:36:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/56556e39-c437-444c-b481-dcc63f1dfcdf/export</guid>
      <pubDate>Sat, 30 Dec 2023 01:36:10 +0000</pubDate>
    </item>
    <item>
      <title>765107a2-2260-4d2d-9e2a-80d2e8669d78</title>
      <link>https://db.gcve.eu/sighting/765107a2-2260-4d2d-9e2a-80d2e8669d78/export</link>
      <description>{"uuid": "765107a2-2260-4d2d-9e2a-80d2e8669d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/arpsyndicate/2282", "content": "#ExploitObserverAlert\n\nCVE-2023-47840\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47840. Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.", "creation_timestamp": "2023-12-31T02:55:38.000000Z"}</description>
      <content:encoded>{"uuid": "765107a2-2260-4d2d-9e2a-80d2e8669d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47840", "type": "seen", "source": "https://t.me/arpsyndicate/2282", "content": "#ExploitObserverAlert\n\nCVE-2023-47840\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47840. Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.", "creation_timestamp": "2023-12-31T02:55:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/765107a2-2260-4d2d-9e2a-80d2e8669d78/export</guid>
      <pubDate>Sun, 31 Dec 2023 02:55:38 +0000</pubDate>
    </item>
    <item>
      <title>e684c100-8073-41b0-9761-ef942b40c8aa</title>
      <link>https://db.gcve.eu/sighting/e684c100-8073-41b0-9761-ef942b40c8aa/export</link>
      <description>{"uuid": "e684c100-8073-41b0-9761-ef942b40c8aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47841", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638707920749", "content": "", "creation_timestamp": "2024-12-09T11:31:17.385819Z"}</description>
      <content:encoded>{"uuid": "e684c100-8073-41b0-9761-ef942b40c8aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47841", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638707920749", "content": "", "creation_timestamp": "2024-12-09T11:31:17.385819Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e684c100-8073-41b0-9761-ef942b40c8aa/export</guid>
      <pubDate>Mon, 09 Dec 2024 11:31:17 +0000</pubDate>
    </item>
    <item>
      <title>7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5</title>
      <link>https://db.gcve.eu/sighting/7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5/export</link>
      <description>{"uuid": "7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638721668524", "content": "", "creation_timestamp": "2024-12-09T11:31:17.554882Z"}</description>
      <content:encoded>{"uuid": "7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638721668524", "content": "", "creation_timestamp": "2024-12-09T11:31:17.554882Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7fb8f60e-7c1b-4bda-8e98-d0c7ed8ae4f5/export</guid>
      <pubDate>Mon, 09 Dec 2024 11:31:17 +0000</pubDate>
    </item>
    <item>
      <title>5f255533-3982-477e-8a19-55b97a418f29</title>
      <link>https://db.gcve.eu/sighting/5f255533-3982-477e-8a19-55b97a418f29/export</link>
      <description>{"uuid": "5f255533-3982-477e-8a19-55b97a418f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638736001369", "content": "", "creation_timestamp": "2024-12-09T11:31:17.914505Z"}</description>
      <content:encoded>{"uuid": "5f255533-3982-477e-8a19-55b97a418f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113622638736001369", "content": "", "creation_timestamp": "2024-12-09T11:31:17.914505Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5f255533-3982-477e-8a19-55b97a418f29/export</guid>
      <pubDate>Mon, 09 Dec 2024 11:31:17 +0000</pubDate>
    </item>
    <item>
      <title>19f27e02-2e1c-4a0f-a591-a16e40b10bb1</title>
      <link>https://db.gcve.eu/sighting/19f27e02-2e1c-4a0f-a591-a16e40b10bb1/export</link>
      <description>{"uuid": "19f27e02-2e1c-4a0f-a591-a16e40b10bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4784", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpnxahu2c", "content": "", "creation_timestamp": "2025-02-11T02:16:56.469208Z"}</description>
      <content:encoded>{"uuid": "19f27e02-2e1c-4a0f-a591-a16e40b10bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4784", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpnxahu2c", "content": "", "creation_timestamp": "2025-02-11T02:16:56.469208Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/19f27e02-2e1c-4a0f-a591-a16e40b10bb1/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:56 +0000</pubDate>
    </item>
  </channel>
</rss>
