<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 01:37:34 +0000</lastBuildDate>
    <item>
      <title>3b411fcd-5b76-4491-83a0-bfdca4ce0110</title>
      <link>https://db.gcve.eu/sighting/3b411fcd-5b76-4491-83a0-bfdca4ce0110/export</link>
      <description>{"uuid": "3b411fcd-5b76-4491-83a0-bfdca4ce0110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/160699", "content": "https://ift.tt/mO1ku3h\nCVE-2023-50069", "creation_timestamp": "2023-12-29T22:26:54.000000Z"}</description>
      <content:encoded>{"uuid": "3b411fcd-5b76-4491-83a0-bfdca4ce0110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/160699", "content": "https://ift.tt/mO1ku3h\nCVE-2023-50069", "creation_timestamp": "2023-12-29T22:26:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b411fcd-5b76-4491-83a0-bfdca4ce0110/export</guid>
      <pubDate>Fri, 29 Dec 2023 22:26:54 +0000</pubDate>
    </item>
    <item>
      <title>b7847ac9-1a43-4ab6-82f5-24672430cee8</title>
      <link>https://db.gcve.eu/sighting/b7847ac9-1a43-4ab6-82f5-24672430cee8/export</link>
      <description>{"uuid": "b7847ac9-1a43-4ab6-82f5-24672430cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/cibsecurity/74007", "content": "\u203c\ufe0fCVE-2023-50069\u203c\ufe0f\n\nWireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored crosssite scripting SXSS through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:27.000000Z"}</description>
      <content:encoded>{"uuid": "b7847ac9-1a43-4ab6-82f5-24672430cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/cibsecurity/74007", "content": "\u203c\ufe0fCVE-2023-50069\u203c\ufe0f\n\nWireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored crosssite scripting SXSS through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7847ac9-1a43-4ab6-82f5-24672430cee8/export</guid>
      <pubDate>Sat, 30 Dec 2023 01:43:27 +0000</pubDate>
    </item>
    <item>
      <title>35c4aab6-58bb-4e67-8a4b-200f3ae501a7</title>
      <link>https://db.gcve.eu/sighting/35c4aab6-58bb-4e67-8a4b-200f3ae501a7/export</link>
      <description>{"uuid": "35c4aab6-58bb-4e67-8a4b-200f3ae501a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/163809", "content": "https://ift.tt/lB6rSz3\nCVE-2023-50069 Exploit", "creation_timestamp": "2024-01-06T04:16:14.000000Z"}</description>
      <content:encoded>{"uuid": "35c4aab6-58bb-4e67-8a4b-200f3ae501a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/163809", "content": "https://ift.tt/lB6rSz3\nCVE-2023-50069 Exploit", "creation_timestamp": "2024-01-06T04:16:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/35c4aab6-58bb-4e67-8a4b-200f3ae501a7/export</guid>
      <pubDate>Sat, 06 Jan 2024 04:16:14 +0000</pubDate>
    </item>
    <item>
      <title>29a726eb-990e-4feb-b559-238201a3a5b3</title>
      <link>https://db.gcve.eu/sighting/29a726eb-990e-4feb-b559-238201a3a5b3/export</link>
      <description>{"uuid": "29a726eb-990e-4feb-b559-238201a3a5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/169328", "content": "https://ift.tt/sGjvB9a\nCVE-2023-5006", "creation_timestamp": "2024-01-17T16:26:26.000000Z"}</description>
      <content:encoded>{"uuid": "29a726eb-990e-4feb-b559-238201a3a5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/169328", "content": "https://ift.tt/sGjvB9a\nCVE-2023-5006", "creation_timestamp": "2024-01-17T16:26:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/29a726eb-990e-4feb-b559-238201a3a5b3/export</guid>
      <pubDate>Wed, 17 Jan 2024 16:26:26 +0000</pubDate>
    </item>
    <item>
      <title>d848001e-bab7-45b3-b05a-f92752d06815</title>
      <link>https://db.gcve.eu/sighting/d848001e-bab7-45b3-b05a-f92752d06815/export</link>
      <description>{"uuid": "d848001e-bab7-45b3-b05a-f92752d06815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/170900", "content": "https://ift.tt/IMbFUDE\nCVE-2023-50069 | WireMock up to 3.2.0.0 cross site scripting (Issue 51)", "creation_timestamp": "2024-01-21T18:46:36.000000Z"}</description>
      <content:encoded>{"uuid": "d848001e-bab7-45b3-b05a-f92752d06815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/170900", "content": "https://ift.tt/IMbFUDE\nCVE-2023-50069 | WireMock up to 3.2.0.0 cross site scripting (Issue 51)", "creation_timestamp": "2024-01-21T18:46:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d848001e-bab7-45b3-b05a-f92752d06815/export</guid>
      <pubDate>Sun, 21 Jan 2024 18:46:36 +0000</pubDate>
    </item>
    <item>
      <title>8e48645e-fc0e-484e-ae8b-0c914872ba7f</title>
      <link>https://db.gcve.eu/sighting/8e48645e-fc0e-484e-ae8b-0c914872ba7f/export</link>
      <description>{"uuid": "8e48645e-fc0e-484e-ae8b-0c914872ba7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/173082", "content": "https://ift.tt/g3AsmDx\nCVE-2023-5006 Exploit", "creation_timestamp": "2024-01-24T21:16:21.000000Z"}</description>
      <content:encoded>{"uuid": "8e48645e-fc0e-484e-ae8b-0c914872ba7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/173082", "content": "https://ift.tt/g3AsmDx\nCVE-2023-5006 Exploit", "creation_timestamp": "2024-01-24T21:16:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8e48645e-fc0e-484e-ae8b-0c914872ba7f/export</guid>
      <pubDate>Wed, 24 Jan 2024 21:16:21 +0000</pubDate>
    </item>
    <item>
      <title>f37012f4-7ff6-4356-b058-f950fcba78b3</title>
      <link>https://db.gcve.eu/sighting/f37012f4-7ff6-4356-b058-f950fcba78b3/export</link>
      <description>{"uuid": "f37012f4-7ff6-4356-b058-f950fcba78b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/181570", "content": "https://ift.tt/sKHxO4p\nCVE-2023-50061", "creation_timestamp": "2024-02-08T19:22:21.000000Z"}</description>
      <content:encoded>{"uuid": "f37012f4-7ff6-4356-b058-f950fcba78b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/181570", "content": "https://ift.tt/sKHxO4p\nCVE-2023-50061", "creation_timestamp": "2024-02-08T19:22:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f37012f4-7ff6-4356-b058-f950fcba78b3/export</guid>
      <pubDate>Thu, 08 Feb 2024 19:22:21 +0000</pubDate>
    </item>
    <item>
      <title>d0f4b797-e893-4def-b573-0e308f3cc656</title>
      <link>https://db.gcve.eu/sighting/d0f4b797-e893-4def-b573-0e308f3cc656/export</link>
      <description>{"uuid": "d0f4b797-e893-4def-b573-0e308f3cc656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/198377", "content": "https://ift.tt/XCIWFRz\nCVE-2023-50061 | Op'art Easy Redirect Module 1.3.8/1.3.9/1.3.10/1.3.11/1.3.12 on PrestaShop hookActionDispatcher sql injection", "creation_timestamp": "2024-03-02T14:46:46.000000Z"}</description>
      <content:encoded>{"uuid": "d0f4b797-e893-4def-b573-0e308f3cc656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/198377", "content": "https://ift.tt/XCIWFRz\nCVE-2023-50061 | Op'art Easy Redirect Module 1.3.8/1.3.9/1.3.10/1.3.11/1.3.12 on PrestaShop hookActionDispatcher sql injection", "creation_timestamp": "2024-03-02T14:46:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d0f4b797-e893-4def-b573-0e308f3cc656/export</guid>
      <pubDate>Sat, 02 Mar 2024 14:46:46 +0000</pubDate>
    </item>
    <item>
      <title>dcb69d7b-f0e3-45e7-b09f-e30fb526c341</title>
      <link>https://db.gcve.eu/sighting/dcb69d7b-f0e3-45e7-b09f-e30fb526c341/export</link>
      <description>{"uuid": "dcb69d7b-f0e3-45e7-b09f-e30fb526c341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5006\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request.\n\ud83d\udccf Published: 2024-01-17T14:31:48.144Z\n\ud83d\udccf Modified: 2025-06-11T17:04:46.980Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8", "creation_timestamp": "2025-06-11T17:34:33.000000Z"}</description>
      <content:encoded>{"uuid": "dcb69d7b-f0e3-45e7-b09f-e30fb526c341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5006\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request.\n\ud83d\udccf Published: 2024-01-17T14:31:48.144Z\n\ud83d\udccf Modified: 2025-06-11T17:04:46.980Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8", "creation_timestamp": "2025-06-11T17:34:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dcb69d7b-f0e3-45e7-b09f-e30fb526c341/export</guid>
      <pubDate>Wed, 11 Jun 2025 17:34:33 +0000</pubDate>
    </item>
  </channel>
</rss>
