<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T11:02:02.262694+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/91e66cd1-37c0-48fc-bd19-a977a6c7f395/export</id>
    <title>91e66cd1-37c0-48fc-bd19-a977a6c7f395</title>
    <updated>2026-05-20T11:02:02.601728+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "91e66cd1-37c0-48fc-bd19-a977a6c7f395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22389", "type": "seen", "source": "https://t.me/cibsecurity/57184", "content": "\u203c CVE-2023-22389 \u203c\n\nSnap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior store passwords in a plaintext file when the device configuration is exported via Save/Restore\u00e2\u20ac\u201c&amp;gt;Backup Settings, which could be read by any user accessing the file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T02:42:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/91e66cd1-37c0-48fc-bd19-a977a6c7f395/export"/>
    <published>2023-01-31T02:42:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/88aa0b39-b941-40a9-a620-93ec50e54c48/export</id>
    <title>88aa0b39-b941-40a9-a620-93ec50e54c48</title>
    <updated>2026-05-20T11:02:02.601675+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "88aa0b39-b941-40a9-a620-93ec50e54c48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22380", "type": "seen", "source": "https://t.me/cibsecurity/58416", "content": "\u203c CVE-2023-22380 \u203c\n\nA path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:18:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/88aa0b39-b941-40a9-a620-93ec50e54c48/export"/>
    <published>2023-02-17T00:18:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/134083aa-d440-40fd-9c6a-52af0c6496d2/export</id>
    <title>134083aa-d440-40fd-9c6a-52af0c6496d2</title>
    <updated>2026-05-20T11:02:02.601619+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "134083aa-d440-40fd-9c6a-52af0c6496d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22381", "type": "seen", "source": "https://t.me/cibsecurity/59347", "content": "\u203c CVE-2023-22381 \u203c\n\nA code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-03T00:44:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/134083aa-d440-40fd-9c6a-52af0c6496d2/export"/>
    <published>2023-03-03T00:44:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a964af09-4c87-4d7f-881e-f7be44a54237/export</id>
    <title>a964af09-4c87-4d7f-881e-f7be44a54237</title>
    <updated>2026-05-20T11:02:02.601564+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a964af09-4c87-4d7f-881e-f7be44a54237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22386", "type": "seen", "source": "https://t.me/cibsecurity/65928", "content": "\u203c CVE-2023-22386 \u203c\n\nMemory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a964af09-4c87-4d7f-881e-f7be44a54237/export"/>
    <published>2023-07-04T12:28:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/69016774-d446-4cd4-a3af-4ab0052f18d1/export</id>
    <title>69016774-d446-4cd4-a3af-4ab0052f18d1</title>
    <updated>2026-05-20T11:02:02.601509+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "69016774-d446-4cd4-a3af-4ab0052f18d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22384", "type": "seen", "source": "https://t.me/cibsecurity/71468", "content": "\u203c CVE-2023-22384 \u203c\n\nMemory Corruption in VR Service while sending data using Fast Message Queue (FMQ).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/69016774-d446-4cd4-a3af-4ab0052f18d1/export"/>
    <published>2023-10-03T12:41:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ef2fbd46-1075-479f-bca1-f91bc5ce3de2/export</id>
    <title>ef2fbd46-1075-479f-bca1-f91bc5ce3de2</title>
    <updated>2026-05-20T11:02:02.601443+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ef2fbd46-1075-479f-bca1-f91bc5ce3de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22382", "type": "seen", "source": "https://t.me/cibsecurity/71481", "content": "\u203c CVE-2023-22382 \u203c\n\nWeak configuration in Automotive while VM is processing a listener request from TEE.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ef2fbd46-1075-479f-bca1-f91bc5ce3de2/export"/>
    <published>2023-10-03T12:41:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/056b90a3-7dce-468c-bd87-7115797f9bc6/export</id>
    <title>056b90a3-7dce-468c-bd87-7115797f9bc6</title>
    <updated>2026-05-20T11:02:02.601357+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "056b90a3-7dce-468c-bd87-7115797f9bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22383", "type": "seen", "source": "https://t.me/ctinow/158842", "content": "https://ift.tt/0YzKQgD\nCVE-2023-22383 | Qualcomm 855 Mobile Platform Camera memory corruption", "creation_timestamp": "2023-12-23T15:21:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/056b90a3-7dce-468c-bd87-7115797f9bc6/export"/>
    <published>2023-12-23T15:21:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8d52b986-9072-48c4-8842-a5098d00fa46/export</id>
    <title>8d52b986-9072-48c4-8842-a5098d00fa46</title>
    <updated>2026-05-20T11:02:02.600194+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8d52b986-9072-48c4-8842-a5098d00fa46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2238", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulo54wyr23", "content": "", "creation_timestamp": "2025-02-11T02:16:05.319258Z"}</content>
    <link href="https://db.gcve.eu/sighting/8d52b986-9072-48c4-8842-a5098d00fa46/export"/>
    <published>2025-02-11T02:16:05.319258+00:00</published>
  </entry>
</feed>
