<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 14:37:58 +0000</lastBuildDate>
    <item>
      <title>27a75fd3-30bc-4c96-9197-854c75e804cb</title>
      <link>https://db.gcve.eu/sighting/27a75fd3-30bc-4c96-9197-854c75e804cb/export</link>
      <description>{"uuid": "27a75fd3-30bc-4c96-9197-854c75e804cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/158460", "content": "https://ift.tt/K0jagI3\nCVE-2023-51661", "creation_timestamp": "2023-12-22T16:23:35.000000Z"}</description>
      <content:encoded>{"uuid": "27a75fd3-30bc-4c96-9197-854c75e804cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/158460", "content": "https://ift.tt/K0jagI3\nCVE-2023-51661", "creation_timestamp": "2023-12-22T16:23:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/27a75fd3-30bc-4c96-9197-854c75e804cb/export</guid>
      <pubDate>Fri, 22 Dec 2023 16:23:35 +0000</pubDate>
    </item>
    <item>
      <title>fb4247cb-b8d0-4b0f-9894-062c8be4a68c</title>
      <link>https://db.gcve.eu/sighting/fb4247cb-b8d0-4b0f-9894-062c8be4a68c/export</link>
      <description>{"uuid": "fb4247cb-b8d0-4b0f-9894-062c8be4a68c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/162240", "content": "https://ift.tt/MkD93JV\nCVE-2023-51661 Exploit", "creation_timestamp": "2024-01-03T08:16:46.000000Z"}</description>
      <content:encoded>{"uuid": "fb4247cb-b8d0-4b0f-9894-062c8be4a68c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/162240", "content": "https://ift.tt/MkD93JV\nCVE-2023-51661 Exploit", "creation_timestamp": "2024-01-03T08:16:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fb4247cb-b8d0-4b0f-9894-062c8be4a68c/export</guid>
      <pubDate>Wed, 03 Jan 2024 08:16:46 +0000</pubDate>
    </item>
    <item>
      <title>96d5bb4e-7687-4756-84b2-83dcf5e7ddf0</title>
      <link>https://db.gcve.eu/sighting/96d5bb4e-7687-4756-84b2-83dcf5e7ddf0/export</link>
      <description>{"uuid": "96d5bb4e-7687-4756-84b2-83dcf5e7ddf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/169646", "content": "https://ift.tt/FuZxPOj\nCVE-2023-51661 | wasmerio wasmer up to 4.2.3 access control (ID 4267)", "creation_timestamp": "2024-01-18T10:11:34.000000Z"}</description>
      <content:encoded>{"uuid": "96d5bb4e-7687-4756-84b2-83dcf5e7ddf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "seen", "source": "https://t.me/ctinow/169646", "content": "https://ift.tt/FuZxPOj\nCVE-2023-51661 | wasmerio wasmer up to 4.2.3 access control (ID 4267)", "creation_timestamp": "2024-01-18T10:11:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/96d5bb4e-7687-4756-84b2-83dcf5e7ddf0/export</guid>
      <pubDate>Thu, 18 Jan 2024 10:11:34 +0000</pubDate>
    </item>
    <item>
      <title>52e3e9d3-8918-4f7a-a68f-c020c4b72980</title>
      <link>https://db.gcve.eu/sighting/52e3e9d3-8918-4f7a-a68f-c020c4b72980/export</link>
      <description>{"uuid": "52e3e9d3-8918-4f7a-a68f-c020c4b72980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12345", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51661\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4.\n\ud83d\udccf Published: 2023-12-22T14:54:23.103Z\n\ud83d\udccf Modified: 2025-04-17T20:29:41.019Z\n\ud83d\udd17 References:\n1. https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j\n2. https://github.com/wasmerio/wasmer/issues/4267\n3. https://github.com/wasmerio/wasmer/commit/4d63febf9d8b257b0531963b85df48d45d0dbf3c", "creation_timestamp": "2025-04-17T20:58:12.000000Z"}</description>
      <content:encoded>{"uuid": "52e3e9d3-8918-4f7a-a68f-c020c4b72980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51661", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12345", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51661\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4.\n\ud83d\udccf Published: 2023-12-22T14:54:23.103Z\n\ud83d\udccf Modified: 2025-04-17T20:29:41.019Z\n\ud83d\udd17 References:\n1. https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j\n2. https://github.com/wasmerio/wasmer/issues/4267\n3. https://github.com/wasmerio/wasmer/commit/4d63febf9d8b257b0531963b85df48d45d0dbf3c", "creation_timestamp": "2025-04-17T20:58:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/52e3e9d3-8918-4f7a-a68f-c020c4b72980/export</guid>
      <pubDate>Thu, 17 Apr 2025 20:58:12 +0000</pubDate>
    </item>
  </channel>
</rss>
