<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 02:41:38 +0000</lastBuildDate>
    <item>
      <title>1679c39e-10c1-41cb-a342-44a9bccacf0b</title>
      <link>https://db.gcve.eu/sighting/1679c39e-10c1-41cb-a342-44a9bccacf0b/export</link>
      <description>{"uuid": "1679c39e-10c1-41cb-a342-44a9bccacf0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "Telegram/2jkVbon0AKvDKm9vj_F7rnMeTxCzgQeChMbLUtudeUZLIg", "content": "", "creation_timestamp": "2025-01-28T11:57:13.000000Z"}</description>
      <content:encoded>{"uuid": "1679c39e-10c1-41cb-a342-44a9bccacf0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "Telegram/2jkVbon0AKvDKm9vj_F7rnMeTxCzgQeChMbLUtudeUZLIg", "content": "", "creation_timestamp": "2025-01-28T11:57:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1679c39e-10c1-41cb-a342-44a9bccacf0b/export</guid>
      <pubDate>Tue, 28 Jan 2025 11:57:13 +0000</pubDate>
    </item>
    <item>
      <title>9d25febb-0003-4fa5-ba79-d5f45441f9d2</title>
      <link>https://db.gcve.eu/sighting/9d25febb-0003-4fa5-ba79-d5f45441f9d2/export</link>
      <description>{"uuid": "9d25febb-0003-4fa5-ba79-d5f45441f9d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lgsvanwiok2v", "content": "", "creation_timestamp": "2025-01-28T16:37:00.514712Z"}</description>
      <content:encoded>{"uuid": "9d25febb-0003-4fa5-ba79-d5f45441f9d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lgsvanwiok2v", "content": "", "creation_timestamp": "2025-01-28T16:37:00.514712Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9d25febb-0003-4fa5-ba79-d5f45441f9d2/export</guid>
      <pubDate>Tue, 28 Jan 2025 16:37:00 +0000</pubDate>
    </item>
    <item>
      <title>26bf48d7-1d5b-4d8d-84db-94967676f040</title>
      <link>https://db.gcve.eu/sighting/26bf48d7-1d5b-4d8d-84db-94967676f040/export</link>
      <description>{"uuid": "26bf48d7-1d5b-4d8d-84db-94967676f040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947708437450296", "content": "", "creation_timestamp": "2025-02-04T21:20:48.457475Z"}</description>
      <content:encoded>{"uuid": "26bf48d7-1d5b-4d8d-84db-94967676f040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947708437450296", "content": "", "creation_timestamp": "2025-02-04T21:20:48.457475Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/26bf48d7-1d5b-4d8d-84db-94967676f040/export</guid>
      <pubDate>Tue, 04 Feb 2025 21:20:48 +0000</pubDate>
    </item>
    <item>
      <title>a1e1fa86-7f08-4834-91a6-fba04b5cdb30</title>
      <link>https://db.gcve.eu/sighting/a1e1fa86-7f08-4834-91a6-fba04b5cdb30/export</link>
      <description>{"uuid": "a1e1fa86-7f08-4834-91a6-fba04b5cdb30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf3hphkne2j", "content": "", "creation_timestamp": "2025-02-04T22:16:14.213709Z"}</description>
      <content:encoded>{"uuid": "a1e1fa86-7f08-4834-91a6-fba04b5cdb30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf3hphkne2j", "content": "", "creation_timestamp": "2025-02-04T22:16:14.213709Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a1e1fa86-7f08-4834-91a6-fba04b5cdb30/export</guid>
      <pubDate>Tue, 04 Feb 2025 22:16:14 +0000</pubDate>
    </item>
    <item>
      <title>8018773b-7eb0-48cf-b83e-276063d18e87</title>
      <link>https://db.gcve.eu/sighting/8018773b-7eb0-48cf-b83e-276063d18e87/export</link>
      <description>{"uuid": "8018773b-7eb0-48cf-b83e-276063d18e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://t.me/cvedetector/17246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53266 - Discourse Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-53266 \nPublished : Feb. 4, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:46.000000Z"}</description>
      <content:encoded>{"uuid": "8018773b-7eb0-48cf-b83e-276063d18e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://t.me/cvedetector/17246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53266 - Discourse Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-53266 \nPublished : Feb. 4, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8018773b-7eb0-48cf-b83e-276063d18e87/export</guid>
      <pubDate>Wed, 05 Feb 2025 00:45:46 +0000</pubDate>
    </item>
    <item>
      <title>4f79b93a-5135-470c-8ac6-35b6767238a3</title>
      <link>https://db.gcve.eu/sighting/4f79b93a-5135-470c-8ac6-35b6767238a3/export</link>
      <description>{"uuid": "4f79b93a-5135-470c-8ac6-35b6767238a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgvfcg2g", "content": "", "creation_timestamp": "2025-02-05T02:23:50.670524Z"}</description>
      <content:encoded>{"uuid": "4f79b93a-5135-470c-8ac6-35b6767238a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgvfcg2g", "content": "", "creation_timestamp": "2025-02-05T02:23:50.670524Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4f79b93a-5135-470c-8ac6-35b6767238a3/export</guid>
      <pubDate>Wed, 05 Feb 2025 02:23:50 +0000</pubDate>
    </item>
    <item>
      <title>1444b14e-b3e3-4c19-9468-13e2063caf7a</title>
      <link>https://db.gcve.eu/sighting/1444b14e-b3e3-4c19-9468-13e2063caf7a/export</link>
      <description>{"uuid": "1444b14e-b3e3-4c19-9468-13e2063caf7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/catra.top/post/3likm72m3o223", "content": "", "creation_timestamp": "2025-02-19T20:24:23.340067Z"}</description>
      <content:encoded>{"uuid": "1444b14e-b3e3-4c19-9468-13e2063caf7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/catra.top/post/3likm72m3o223", "content": "", "creation_timestamp": "2025-02-19T20:24:23.340067Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1444b14e-b3e3-4c19-9468-13e2063caf7a/export</guid>
      <pubDate>Wed, 19 Feb 2025 20:24:23 +0000</pubDate>
    </item>
    <item>
      <title>b439b741-1292-4f62-bec2-f9287c1da90d</title>
      <link>https://db.gcve.eu/sighting/b439b741-1292-4f62-bec2-f9287c1da90d/export</link>
      <description>{"uuid": "b439b741-1292-4f62-bec2-f9287c1da90d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/investigationAnonYmous1/10822", "content": "CVE-2024-5326 WordPress \n\nPost Grid Gutenberg - PostX plugin = 4.1.2\n\u064a\u062a\u064a\u062d User Contributor \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0648\u062a\u0639\u064a\u064a\u0646 \u0627\u0644\u062f\u0648\u0631 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0644\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0625\u0644\u0649 \u0627\u0644\u0645\u0633\u0624\u0648\u0644 .\n\nexploit  POC \nURL- investigationAnonYmous \n\n#wordpress #exploit", "creation_timestamp": "2025-05-06T15:29:12.000000Z"}</description>
      <content:encoded>{"uuid": "b439b741-1292-4f62-bec2-f9287c1da90d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5326", "type": "published-proof-of-concept", "source": "https://t.me/investigationAnonYmous1/10822", "content": "CVE-2024-5326 WordPress \n\nPost Grid Gutenberg - PostX plugin = 4.1.2\n\u064a\u062a\u064a\u062d User Contributor \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0648\u062a\u0639\u064a\u064a\u0646 \u0627\u0644\u062f\u0648\u0631 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0644\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u062c\u062f\u062f \u0625\u0644\u0649 \u0627\u0644\u0645\u0633\u0624\u0648\u0644 .\n\nexploit  POC \nURL- investigationAnonYmous \n\n#wordpress #exploit", "creation_timestamp": "2025-05-06T15:29:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b439b741-1292-4f62-bec2-f9287c1da90d/export</guid>
      <pubDate>Tue, 06 May 2025 15:29:12 +0000</pubDate>
    </item>
    <item>
      <title>23fed609-76cf-4787-98bb-d16f3f47f074</title>
      <link>https://db.gcve.eu/sighting/23fed609-76cf-4787-98bb-d16f3f47f074/export</link>
      <description>{"uuid": "23fed609-76cf-4787-98bb-d16f3f47f074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}</description>
      <content:encoded>{"uuid": "23fed609-76cf-4787-98bb-d16f3f47f074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/23fed609-76cf-4787-98bb-d16f3f47f074/export</guid>
      <pubDate>Mon, 01 Sep 2025 19:03:03 +0000</pubDate>
    </item>
    <item>
      <title>2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f</title>
      <link>https://db.gcve.eu/sighting/2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f/export</link>
      <description>{"uuid": "2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3mddymicpvb42", "content": "", "creation_timestamp": "2026-01-26T19:38:04.090342Z"}</description>
      <content:encoded>{"uuid": "2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53263", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3mddymicpvb42", "content": "", "creation_timestamp": "2026-01-26T19:38:04.090342Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2ab0c640-a678-4a3a-bf4b-d1f0d3773a6f/export</guid>
      <pubDate>Mon, 26 Jan 2026 19:38:04 +0000</pubDate>
    </item>
  </channel>
</rss>
