<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T11:55:54.778884+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4cbedcfc-67ca-46dd-8f83-297a4d051ce1/export</id>
    <title>4cbedcfc-67ca-46dd-8f83-297a4d051ce1</title>
    <updated>2026-05-20T11:55:55.290321+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4cbedcfc-67ca-46dd-8f83-297a4d051ce1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19913", "type": "published-proof-of-concept", "source": "https://t.me/defcon_news/169", "content": "#0daytoday #DomainMOD 4.11.01 - Cross-Site Scripting Vulnerability CVE-2018-19913 [webapps #exploits #Vulnerability #0day #Exploit]\nhttp://0day.today/exploits/31757\n\nvia 0day.today", "creation_timestamp": "2018-12-12T05:16:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4cbedcfc-67ca-46dd-8f83-297a4d051ce1/export"/>
    <published>2018-12-12T05:16:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6ff41d37-b264-4110-91a5-6b3b87e807d7/export</id>
    <title>6ff41d37-b264-4110-91a5-6b3b87e807d7</title>
    <updated>2026-05-20T11:55:55.290225+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ff41d37-b264-4110-91a5-6b3b87e807d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19915", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46376", "content": "", "creation_timestamp": "2019-02-14T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ff41d37-b264-4110-91a5-6b3b87e807d7/export"/>
    <published>2019-02-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/77df7768-0328-4b8c-b007-872fa2a5ae2d/export</id>
    <title>77df7768-0328-4b8c-b007-872fa2a5ae2d</title>
    <updated>2026-05-20T11:55:55.290112+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "77df7768-0328-4b8c-b007-872fa2a5ae2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19914", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46375", "content": "", "creation_timestamp": "2019-02-14T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/77df7768-0328-4b8c-b007-872fa2a5ae2d/export"/>
    <published>2019-02-14T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/291ae011-8823-431f-8e8e-b8d3c340ce1f/export</id>
    <title>291ae011-8823-431f-8e8e-b8d3c340ce1f</title>
    <updated>2026-05-20T11:55:55.289968+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "291ae011-8823-431f-8e8e-b8d3c340ce1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-1991", "type": "seen", "source": "https://t.me/cibsecurity/4440", "content": "ATENTION\u203c New - CVE-2018-1991\n\nIBM API Connect 5.0.0.0, and 5.0.8.6 could could return sensitive information that could provide critical information as to the underlying software stack in CMC UI headers. IBM X-Force ID: 154284.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-22T18:29:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/291ae011-8823-431f-8e8e-b8d3c340ce1f/export"/>
    <published>2019-05-22T18:29:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/43dddfda-c2bc-46b3-a9e2-d9dcf9d04e26/export</id>
    <title>43dddfda-c2bc-46b3-a9e2-d9dcf9d04e26</title>
    <updated>2026-05-20T11:55:55.285884+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "43dddfda-c2bc-46b3-a9e2-d9dcf9d04e26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19918", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15195", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-19918\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: CuppaCMS has XSS via an SVG document uploaded to the administrator/#/component/table_manager/view/cu_views URI.\n\ud83d\udccf Published: 2018-12-31T15:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T19:02:43.962Z\n\ud83d\udd17 References:\n1. https://github.com/security-breachlock/CVE-2018-19918/blob/master/cuppa_svg.pdf\n2. https://github.com/CuppaCMS/CuppaCMS/issues/3", "creation_timestamp": "2025-05-06T19:21:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/43dddfda-c2bc-46b3-a9e2-d9dcf9d04e26/export"/>
    <published>2025-05-06T19:21:10+00:00</published>
  </entry>
</feed>
