<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:55:03 +0000</lastBuildDate>
    <item>
      <title>3843bcf5-a6e5-4bbd-8787-9fa759c64b3c</title>
      <link>https://vulnerability.circl.lu/sighting/3843bcf5-a6e5-4bbd-8787-9fa759c64b3c/export</link>
      <description>{"uuid": "3843bcf5-a6e5-4bbd-8787-9fa759c64b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4774", "type": "seen", "source": "https://t.me/arpsyndicate/2458", "content": "#ExploitObserverAlert\n\nCVE-2023-4774\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-4774. The WP-Matomo Integration (WP-Piwik) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp-piwik' shortcode in versions up to, and including, 1.0.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-04T12:49:33.000000Z"}</description>
      <content:encoded>{"uuid": "3843bcf5-a6e5-4bbd-8787-9fa759c64b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4774", "type": "seen", "source": "https://t.me/arpsyndicate/2458", "content": "#ExploitObserverAlert\n\nCVE-2023-4774\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-4774. The WP-Matomo Integration (WP-Piwik) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp-piwik' shortcode in versions up to, and including, 1.0.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-04T12:49:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3843bcf5-a6e5-4bbd-8787-9fa759c64b3c/export</guid>
      <pubDate>Thu, 04 Jan 2024 12:49:33 +0000</pubDate>
    </item>
    <item>
      <title>17122cbe-7640-4ef3-86a3-90012d8d3355</title>
      <link>https://vulnerability.circl.lu/sighting/17122cbe-7640-4ef3-86a3-90012d8d3355/export</link>
      <description>{"uuid": "17122cbe-7640-4ef3-86a3-90012d8d3355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/171394", "content": "https://ift.tt/KlicdEn\nCVE-2023-47746", "creation_timestamp": "2024-01-22T20:26:18.000000Z"}</description>
      <content:encoded>{"uuid": "17122cbe-7640-4ef3-86a3-90012d8d3355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/171394", "content": "https://ift.tt/KlicdEn\nCVE-2023-47746", "creation_timestamp": "2024-01-22T20:26:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/17122cbe-7640-4ef3-86a3-90012d8d3355/export</guid>
      <pubDate>Mon, 22 Jan 2024 20:26:18 +0000</pubDate>
    </item>
    <item>
      <title>1fb2e156-5b76-4c60-b2b0-c35c00f663e5</title>
      <link>https://vulnerability.circl.lu/sighting/1fb2e156-5b76-4c60-b2b0-c35c00f663e5/export</link>
      <description>{"uuid": "1fb2e156-5b76-4c60-b2b0-c35c00f663e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/171441", "content": "https://ift.tt/NaUhclX\nCVE-2023-47747", "creation_timestamp": "2024-01-22T21:31:23.000000Z"}</description>
      <content:encoded>{"uuid": "1fb2e156-5b76-4c60-b2b0-c35c00f663e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/171441", "content": "https://ift.tt/NaUhclX\nCVE-2023-47747", "creation_timestamp": "2024-01-22T21:31:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1fb2e156-5b76-4c60-b2b0-c35c00f663e5/export</guid>
      <pubDate>Mon, 22 Jan 2024 21:31:23 +0000</pubDate>
    </item>
    <item>
      <title>395638f7-4a1e-45c0-8051-ff29c0cb7dd3</title>
      <link>https://vulnerability.circl.lu/sighting/395638f7-4a1e-45c0-8051-ff29c0cb7dd3/export</link>
      <description>{"uuid": "395638f7-4a1e-45c0-8051-ff29c0cb7dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/186224", "content": "https://ift.tt/Renfb2q\nCVE-2023-47746 | IBM DB2/DB2 Connect Server 10.5/11.1/11.5 Query denial of service (XFDB-272644)", "creation_timestamp": "2024-02-16T10:11:41.000000Z"}</description>
      <content:encoded>{"uuid": "395638f7-4a1e-45c0-8051-ff29c0cb7dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/186224", "content": "https://ift.tt/Renfb2q\nCVE-2023-47746 | IBM DB2/DB2 Connect Server 10.5/11.1/11.5 Query denial of service (XFDB-272644)", "creation_timestamp": "2024-02-16T10:11:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/395638f7-4a1e-45c0-8051-ff29c0cb7dd3/export</guid>
      <pubDate>Fri, 16 Feb 2024 10:11:41 +0000</pubDate>
    </item>
    <item>
      <title>2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6</title>
      <link>https://vulnerability.circl.lu/sighting/2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6/export</link>
      <description>{"uuid": "2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/186226", "content": "https://ift.tt/LB4WzAZ\nCVE-2023-47747 | IBM DB2/DB2 Connect Server 10.5/11.1 /11.5 Query denial of service (XFDB-272646)", "creation_timestamp": "2024-02-16T10:11:43.000000Z"}</description>
      <content:encoded>{"uuid": "2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/186226", "content": "https://ift.tt/LB4WzAZ\nCVE-2023-47747 | IBM DB2/DB2 Connect Server 10.5/11.1 /11.5 Query denial of service (XFDB-272646)", "creation_timestamp": "2024-02-16T10:11:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6/export</guid>
      <pubDate>Fri, 16 Feb 2024 10:11:43 +0000</pubDate>
    </item>
    <item>
      <title>fcb44aac-3790-46ec-9984-f54419a08dbd</title>
      <link>https://vulnerability.circl.lu/sighting/fcb44aac-3790-46ec-9984-f54419a08dbd/export</link>
      <description>{"uuid": "fcb44aac-3790-46ec-9984-f54419a08dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198718", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "fcb44aac-3790-46ec-9984-f54419a08dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198718", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fcb44aac-3790-46ec-9984-f54419a08dbd/export</guid>
      <pubDate>Sun, 03 Mar 2024 13:26:53 +0000</pubDate>
    </item>
    <item>
      <title>951c93d7-752f-49f9-acf1-2e0cd24beffb</title>
      <link>https://vulnerability.circl.lu/sighting/951c93d7-752f-49f9-acf1-2e0cd24beffb/export</link>
      <description>{"uuid": "951c93d7-752f-49f9-acf1-2e0cd24beffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198720", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:31:34.000000Z"}</description>
      <content:encoded>{"uuid": "951c93d7-752f-49f9-acf1-2e0cd24beffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198720", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:31:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/951c93d7-752f-49f9-acf1-2e0cd24beffb/export</guid>
      <pubDate>Sun, 03 Mar 2024 13:31:34 +0000</pubDate>
    </item>
    <item>
      <title>8508e6d7-ae8e-4bf2-b857-357ee8b1597c</title>
      <link>https://vulnerability.circl.lu/sighting/8508e6d7-ae8e-4bf2-b857-357ee8b1597c/export</link>
      <description>{"uuid": "8508e6d7-ae8e-4bf2-b857-357ee8b1597c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198741", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:26:39.000000Z"}</description>
      <content:encoded>{"uuid": "8508e6d7-ae8e-4bf2-b857-357ee8b1597c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198741", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:26:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8508e6d7-ae8e-4bf2-b857-357ee8b1597c/export</guid>
      <pubDate>Sun, 03 Mar 2024 14:26:39 +0000</pubDate>
    </item>
    <item>
      <title>fa7d3a6e-2737-41b8-844d-d7a01283180d</title>
      <link>https://vulnerability.circl.lu/sighting/fa7d3a6e-2737-41b8-844d-d7a01283180d/export</link>
      <description>{"uuid": "fa7d3a6e-2737-41b8-844d-d7a01283180d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198745", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:31:31.000000Z"}</description>
      <content:encoded>{"uuid": "fa7d3a6e-2737-41b8-844d-d7a01283180d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198745", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:31:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fa7d3a6e-2737-41b8-844d-d7a01283180d/export</guid>
      <pubDate>Sun, 03 Mar 2024 14:31:31 +0000</pubDate>
    </item>
  </channel>
</rss>
