<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 07:59:22 +0000</lastBuildDate>
    <item>
      <title>c251cf4c-80d9-4698-8673-f61e1f1befe4</title>
      <link>https://db.gcve.eu/sighting/c251cf4c-80d9-4698-8673-f61e1f1befe4/export</link>
      <description>{"uuid": "c251cf4c-80d9-4698-8673-f61e1f1befe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1514", "type": "seen", "source": "https://t.me/cvedetector/21163", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1514 - WooCommerce Active Products Tables Plugin Filter Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1514 \nPublished : March 26, 2025, 9:15 a.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to unauthorized filter calling due to insufficient restrictions on the get_smth() function in all versions up to, and including, 1.0.6.7. This makes it possible for unauthenticated attackers to call arbitrary WordPress filters with a single parameter. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T12:12:49.000000Z"}</description>
      <content:encoded>{"uuid": "c251cf4c-80d9-4698-8673-f61e1f1befe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1514", "type": "seen", "source": "https://t.me/cvedetector/21163", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1514 - WooCommerce Active Products Tables Plugin Filter Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1514 \nPublished : March 26, 2025, 9:15 a.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to unauthorized filter calling due to insufficient restrictions on the get_smth() function in all versions up to, and including, 1.0.6.7. This makes it possible for unauthenticated attackers to call arbitrary WordPress filters with a single parameter. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T12:12:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c251cf4c-80d9-4698-8673-f61e1f1befe4/export</guid>
      <pubDate>Wed, 26 Mar 2025 12:12:49 +0000</pubDate>
    </item>
    <item>
      <title>c70fd012-bacf-42b8-b74b-80137bbdc322</title>
      <link>https://db.gcve.eu/sighting/c70fd012-bacf-42b8-b74b-80137bbdc322/export</link>
      <description>{"uuid": "c70fd012-bacf-42b8-b74b-80137bbdc322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15146", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mb2urmxinu2p", "content": "", "creation_timestamp": "2025-12-28T17:45:03.176550Z"}</description>
      <content:encoded>{"uuid": "c70fd012-bacf-42b8-b74b-80137bbdc322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15146", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mb2urmxinu2p", "content": "", "creation_timestamp": "2025-12-28T17:45:03.176550Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c70fd012-bacf-42b8-b74b-80137bbdc322/export</guid>
      <pubDate>Sun, 28 Dec 2025 17:45:03 +0000</pubDate>
    </item>
    <item>
      <title>b4ba5028-970f-441e-8147-b51ad4ad0999</title>
      <link>https://db.gcve.eu/sighting/b4ba5028-970f-441e-8147-b51ad4ad0999/export</link>
      <description>{"uuid": "b4ba5028-970f-441e-8147-b51ad4ad0999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15142", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2wdhrr6x2y", "content": "", "creation_timestamp": "2025-12-28T18:12:47.866722Z"}</description>
      <content:encoded>{"uuid": "b4ba5028-970f-441e-8147-b51ad4ad0999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15142", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2wdhrr6x2y", "content": "", "creation_timestamp": "2025-12-28T18:12:47.866722Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b4ba5028-970f-441e-8147-b51ad4ad0999/export</guid>
      <pubDate>Sun, 28 Dec 2025 18:12:47 +0000</pubDate>
    </item>
    <item>
      <title>add09c56-b034-4594-a528-544c38845ac4</title>
      <link>https://db.gcve.eu/sighting/add09c56-b034-4594-a528-544c38845ac4/export</link>
      <description>{"uuid": "add09c56-b034-4594-a528-544c38845ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15140", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2wvelgvx22", "content": "", "creation_timestamp": "2025-12-28T18:22:52.981499Z"}</description>
      <content:encoded>{"uuid": "add09c56-b034-4594-a528-544c38845ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15140", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2wvelgvx22", "content": "", "creation_timestamp": "2025-12-28T18:22:52.981499Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/add09c56-b034-4594-a528-544c38845ac4/export</guid>
      <pubDate>Sun, 28 Dec 2025 18:22:52 +0000</pubDate>
    </item>
    <item>
      <title>9a49f0ff-78a0-47e1-8b54-9d81ab755391</title>
      <link>https://db.gcve.eu/sighting/9a49f0ff-78a0-47e1-8b54-9d81ab755391/export</link>
      <description>{"uuid": "9a49f0ff-78a0-47e1-8b54-9d81ab755391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15143", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2x6cykw42x", "content": "", "creation_timestamp": "2025-12-28T18:27:48.862416Z"}</description>
      <content:encoded>{"uuid": "9a49f0ff-78a0-47e1-8b54-9d81ab755391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15143", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2x6cykw42x", "content": "", "creation_timestamp": "2025-12-28T18:27:48.862416Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9a49f0ff-78a0-47e1-8b54-9d81ab755391/export</guid>
      <pubDate>Sun, 28 Dec 2025 18:27:48 +0000</pubDate>
    </item>
    <item>
      <title>1e632d90-2334-4f2a-b9fc-cc12e2a4896d</title>
      <link>https://db.gcve.eu/sighting/1e632d90-2334-4f2a-b9fc-cc12e2a4896d/export</link>
      <description>{"uuid": "1e632d90-2334-4f2a-b9fc-cc12e2a4896d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15141", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2xhbghj62x", "content": "", "creation_timestamp": "2025-12-28T18:32:49.174294Z"}</description>
      <content:encoded>{"uuid": "1e632d90-2334-4f2a-b9fc-cc12e2a4896d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15141", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb2xhbghj62x", "content": "", "creation_timestamp": "2025-12-28T18:32:49.174294Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1e632d90-2334-4f2a-b9fc-cc12e2a4896d/export</guid>
      <pubDate>Sun, 28 Dec 2025 18:32:49 +0000</pubDate>
    </item>
    <item>
      <title>e1a0bbfb-274e-4f22-95ef-3a6486e9913d</title>
      <link>https://db.gcve.eu/sighting/e1a0bbfb-274e-4f22-95ef-3a6486e9913d/export</link>
      <description>{"uuid": "e1a0bbfb-274e-4f22-95ef-3a6486e9913d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15146", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb35v2qw2u2r", "content": "", "creation_timestamp": "2025-12-28T20:27:54.310789Z"}</description>
      <content:encoded>{"uuid": "e1a0bbfb-274e-4f22-95ef-3a6486e9913d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15146", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb35v2qw2u2r", "content": "", "creation_timestamp": "2025-12-28T20:27:54.310789Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e1a0bbfb-274e-4f22-95ef-3a6486e9913d/export</guid>
      <pubDate>Sun, 28 Dec 2025 20:27:54 +0000</pubDate>
    </item>
    <item>
      <title>f4ecb858-f422-44e0-82e0-0e87814c10c9</title>
      <link>https://db.gcve.eu/sighting/f4ecb858-f422-44e0-82e0-0e87814c10c9/export</link>
      <description>{"uuid": "f4ecb858-f422-44e0-82e0-0e87814c10c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15144", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb373d4wzs2g", "content": "", "creation_timestamp": "2025-12-28T20:49:18.164399Z"}</description>
      <content:encoded>{"uuid": "f4ecb858-f422-44e0-82e0-0e87814c10c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15144", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb373d4wzs2g", "content": "", "creation_timestamp": "2025-12-28T20:49:18.164399Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f4ecb858-f422-44e0-82e0-0e87814c10c9/export</guid>
      <pubDate>Sun, 28 Dec 2025 20:49:18 +0000</pubDate>
    </item>
    <item>
      <title>83dbfbaf-d189-4d3d-aa53-975807e80045</title>
      <link>https://db.gcve.eu/sighting/83dbfbaf-d189-4d3d-aa53-975807e80045/export</link>
      <description>{"uuid": "83dbfbaf-d189-4d3d-aa53-975807e80045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15149", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb37ebkv6c22", "content": "", "creation_timestamp": "2025-12-28T20:54:32.728716Z"}</description>
      <content:encoded>{"uuid": "83dbfbaf-d189-4d3d-aa53-975807e80045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15149", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb37ebkv6c22", "content": "", "creation_timestamp": "2025-12-28T20:54:32.728716Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/83dbfbaf-d189-4d3d-aa53-975807e80045/export</guid>
      <pubDate>Sun, 28 Dec 2025 20:54:32 +0000</pubDate>
    </item>
    <item>
      <title>bca9a43d-25ce-4415-af73-9895636e9dbe</title>
      <link>https://db.gcve.eu/sighting/bca9a43d-25ce-4415-af73-9895636e9dbe/export</link>
      <description>{"uuid": "bca9a43d-25ce-4415-af73-9895636e9dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15148", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb37w6hykp2r", "content": "", "creation_timestamp": "2025-12-28T21:04:19.401321Z"}</description>
      <content:encoded>{"uuid": "bca9a43d-25ce-4415-af73-9895636e9dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-15148", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mb37w6hykp2r", "content": "", "creation_timestamp": "2025-12-28T21:04:19.401321Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bca9a43d-25ce-4415-af73-9895636e9dbe/export</guid>
      <pubDate>Sun, 28 Dec 2025 21:04:19 +0000</pubDate>
    </item>
  </channel>
</rss>
