<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T15:14:33.608814+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e78cb445-b6ea-4a58-8523-d0c87d223202/export</id>
    <title>e78cb445-b6ea-4a58-8523-d0c87d223202</title>
    <updated>2026-05-07T15:14:34.030312+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e78cb445-b6ea-4a58-8523-d0c87d223202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "https://t.me/cibsecurity/61014", "content": "\u203c CVE-2023-26982 \u203c\n\nTrudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T18:15:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e78cb445-b6ea-4a58-8523-d0c87d223202/export"/>
    <published>2023-03-29T18:15:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1698386c-5ad6-45bd-8285-e9ef7a160006/export</id>
    <title>1698386c-5ad6-45bd-8285-e9ef7a160006</title>
    <updated>2026-05-07T15:14:34.030257+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1698386c-5ad6-45bd-8285-e9ef7a160006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26986", "type": "seen", "source": "https://t.me/cibsecurity/61777", "content": "\u203c CVE-2023-26986 \u203c\n\nAn issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T20:27:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1698386c-5ad6-45bd-8285-e9ef7a160006/export"/>
    <published>2023-04-10T20:27:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5520f207-68de-482f-a477-2ffaae52271a/export</id>
    <title>5520f207-68de-482f-a477-2ffaae52271a</title>
    <updated>2026-05-07T15:14:34.030201+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5520f207-68de-482f-a477-2ffaae52271a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26980", "type": "seen", "source": "https://t.me/cibsecurity/62122", "content": "\u203c CVE-2023-26980 \u203c\n\nPAX Technology PAX A920 Pro PayDroid 8.1suffers from a Race Condition vulnerability, which allows attackers to bypass the payment software and force the OS to boot directly to Android during the boot process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T16:25:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5520f207-68de-482f-a477-2ffaae52271a/export"/>
    <published>2023-04-14T16:25:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84/export</id>
    <title>c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84</title>
    <updated>2026-05-07T15:14:34.030135+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2698", "type": "seen", "source": "https://t.me/cibsecurity/64077", "content": "\u203c CVE-2023-2698 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Lost and Found Information System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=items/manage_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228979.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-14T23:49:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84/export"/>
    <published>2023-05-14T23:49:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/926e532c-ba26-4cfb-9d11-a048facc3607/export</id>
    <title>926e532c-ba26-4cfb-9d11-a048facc3607</title>
    <updated>2026-05-07T15:14:34.030062+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "926e532c-ba26-4cfb-9d11-a048facc3607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "Telegram/QAOD_72W-JjHGQvJeVwijRdf3kxEY3oAVDpAL75MAcOkDeUc", "content": "", "creation_timestamp": "2025-02-18T21:11:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/926e532c-ba26-4cfb-9d11-a048facc3607/export"/>
    <published>2025-02-18T21:11:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fce8b7e8-ba2a-42b0-8d46-ca1a68ede505/export</id>
    <title>fce8b7e8-ba2a-42b0-8d46-ca1a68ede505</title>
    <updated>2026-05-07T15:14:34.029001+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fce8b7e8-ba2a-42b0-8d46-ca1a68ede505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26984", "type": "seen", "source": "Telegram/WnZR_-i7omyzJQ5LeDolm44SuD28_ij74Lz2bvZhbm8FIfMH", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fce8b7e8-ba2a-42b0-8d46-ca1a68ede505/export"/>
    <published>2025-02-18T21:11:32+00:00</published>
  </entry>
</feed>
