<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:19:27 +0000</lastBuildDate>
    <item>
      <title>4c5513c0-3c6c-41de-9536-4d504947b960</title>
      <link>https://db.gcve.eu/sighting/4c5513c0-3c6c-41de-9536-4d504947b960/export</link>
      <description>{"uuid": "4c5513c0-3c6c-41de-9536-4d504947b960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5233", "type": "seen", "source": "https://t.me/cibsecurity/71185", "content": "\u203c CVE-2023-5233 \u203c\n\nThe Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-28T12:49:44.000000Z"}</description>
      <content:encoded>{"uuid": "4c5513c0-3c6c-41de-9536-4d504947b960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5233", "type": "seen", "source": "https://t.me/cibsecurity/71185", "content": "\u203c CVE-2023-5233 \u203c\n\nThe Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-28T12:49:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4c5513c0-3c6c-41de-9536-4d504947b960/export</guid>
      <pubDate>Thu, 28 Sep 2023 12:49:44 +0000</pubDate>
    </item>
    <item>
      <title>d6a41c97-9bd8-4062-87d1-f736216430d3</title>
      <link>https://db.gcve.eu/sighting/d6a41c97-9bd8-4062-87d1-f736216430d3/export</link>
      <description>{"uuid": "d6a41c97-9bd8-4062-87d1-f736216430d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/167032", "content": "https://ift.tt/32Y76Wr\nCVE-2023-52339", "creation_timestamp": "2024-01-12T03:56:22.000000Z"}</description>
      <content:encoded>{"uuid": "d6a41c97-9bd8-4062-87d1-f736216430d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/167032", "content": "https://ift.tt/32Y76Wr\nCVE-2023-52339", "creation_timestamp": "2024-01-12T03:56:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d6a41c97-9bd8-4062-87d1-f736216430d3/export</guid>
      <pubDate>Fri, 12 Jan 2024 03:56:22 +0000</pubDate>
    </item>
    <item>
      <title>3fc5c0dc-4fb4-4709-9b31-3fa1727d4f35</title>
      <link>https://db.gcve.eu/sighting/3fc5c0dc-4fb4-4709-9b31-3fa1727d4f35/export</link>
      <description>{"uuid": "3fc5c0dc-4fb4-4709-9b31-3fa1727d4f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/171361", "content": "https://ift.tt/z5VtcCD\nCVE-2023-52339 Exploit", "creation_timestamp": "2024-01-22T19:16:59.000000Z"}</description>
      <content:encoded>{"uuid": "3fc5c0dc-4fb4-4709-9b31-3fa1727d4f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/171361", "content": "https://ift.tt/z5VtcCD\nCVE-2023-52339 Exploit", "creation_timestamp": "2024-01-22T19:16:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3fc5c0dc-4fb4-4709-9b31-3fa1727d4f35/export</guid>
      <pubDate>Mon, 22 Jan 2024 19:16:59 +0000</pubDate>
    </item>
    <item>
      <title>f4073b32-0123-4f5d-b169-2fb3ea5558c1</title>
      <link>https://db.gcve.eu/sighting/f4073b32-0123-4f5d-b169-2fb3ea5558c1/export</link>
      <description>{"uuid": "f4073b32-0123-4f5d-b169-2fb3ea5558c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/177940", "content": "https://ift.tt/qZ9Qcjw\nCVE-2023-52339 | libebml up to 1.4.4 MemIOCallback.cpp integer overflow (Issue 147)", "creation_timestamp": "2024-02-02T07:36:39.000000Z"}</description>
      <content:encoded>{"uuid": "f4073b32-0123-4f5d-b169-2fb3ea5558c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52339", "type": "seen", "source": "https://t.me/ctinow/177940", "content": "https://ift.tt/qZ9Qcjw\nCVE-2023-52339 | libebml up to 1.4.4 MemIOCallback.cpp integer overflow (Issue 147)", "creation_timestamp": "2024-02-02T07:36:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f4073b32-0123-4f5d-b169-2fb3ea5558c1/export</guid>
      <pubDate>Fri, 02 Feb 2024 07:36:39 +0000</pubDate>
    </item>
    <item>
      <title>1eb0079a-5103-47b6-b1ce-4bc64533fba1</title>
      <link>https://db.gcve.eu/sighting/1eb0079a-5103-47b6-b1ce-4bc64533fba1/export</link>
      <description>{"uuid": "1eb0079a-5103-47b6-b1ce-4bc64533fba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52332", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528607465318059", "content": "", "creation_timestamp": "2024-11-22T20:57:54.497870Z"}</description>
      <content:encoded>{"uuid": "1eb0079a-5103-47b6-b1ce-4bc64533fba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52332", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528607465318059", "content": "", "creation_timestamp": "2024-11-22T20:57:54.497870Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1eb0079a-5103-47b6-b1ce-4bc64533fba1/export</guid>
      <pubDate>Fri, 22 Nov 2024 20:57:54 +0000</pubDate>
    </item>
    <item>
      <title>9a750c3e-18e2-4aef-9f61-818edb5ae2ed</title>
      <link>https://db.gcve.eu/sighting/9a750c3e-18e2-4aef-9f61-818edb5ae2ed/export</link>
      <description>{"uuid": "9a750c3e-18e2-4aef-9f61-818edb5ae2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52333", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528607479224384", "content": "", "creation_timestamp": "2024-11-22T20:57:54.960834Z"}</description>
      <content:encoded>{"uuid": "9a750c3e-18e2-4aef-9f61-818edb5ae2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52333", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528607479224384", "content": "", "creation_timestamp": "2024-11-22T20:57:54.960834Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9a750c3e-18e2-4aef-9f61-818edb5ae2ed/export</guid>
      <pubDate>Fri, 22 Nov 2024 20:57:54 +0000</pubDate>
    </item>
    <item>
      <title>f5b113b0-ec21-4f54-afe7-4f482f17113e</title>
      <link>https://db.gcve.eu/sighting/f5b113b0-ec21-4f54-afe7-4f482f17113e/export</link>
      <description>{"uuid": "f5b113b0-ec21-4f54-afe7-4f482f17113e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52334", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528666481839466", "content": "", "creation_timestamp": "2024-11-22T21:12:54.812767Z"}</description>
      <content:encoded>{"uuid": "f5b113b0-ec21-4f54-afe7-4f482f17113e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52334", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528666481839466", "content": "", "creation_timestamp": "2024-11-22T21:12:54.812767Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f5b113b0-ec21-4f54-afe7-4f482f17113e/export</guid>
      <pubDate>Fri, 22 Nov 2024 21:12:54 +0000</pubDate>
    </item>
    <item>
      <title>2c093a14-de5b-4298-87bd-fe29f85a61a8</title>
      <link>https://db.gcve.eu/sighting/2c093a14-de5b-4298-87bd-fe29f85a61a8/export</link>
      <description>{"uuid": "2c093a14-de5b-4298-87bd-fe29f85a61a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52335", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528666495754252", "content": "", "creation_timestamp": "2024-11-22T21:12:55.042328Z"}</description>
      <content:encoded>{"uuid": "2c093a14-de5b-4298-87bd-fe29f85a61a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52335", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528666495754252", "content": "", "creation_timestamp": "2024-11-22T21:12:55.042328Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c093a14-de5b-4298-87bd-fe29f85a61a8/export</guid>
      <pubDate>Fri, 22 Nov 2024 21:12:55 +0000</pubDate>
    </item>
  </channel>
</rss>
