<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T06:12:04.023978+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c7ab578c-67a6-4f20-94a9-09099249e388/export</id>
    <title>c7ab578c-67a6-4f20-94a9-09099249e388</title>
    <updated>2026-05-04T06:12:04.370742+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c7ab578c-67a6-4f20-94a9-09099249e388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/169162", "content": "https://ift.tt/OHA7FMo\nCVE-2023-51735", "creation_timestamp": "2024-01-17T09:26:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c7ab578c-67a6-4f20-94a9-09099249e388/export"/>
    <published>2024-01-17T09:26:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8452959f-835d-4542-a2d7-3ebe2de8b1c8/export</id>
    <title>8452959f-835d-4542-a2d7-3ebe2de8b1c8</title>
    <updated>2026-05-04T06:12:04.370661+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8452959f-835d-4542-a2d7-3ebe2de8b1c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/182571", "content": "https://ift.tt/zwaTDoY\nCVE-2023-51735 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Pre-shared key cross site scripting (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T15:17:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8452959f-835d-4542-a2d7-3ebe2de8b1c8/export"/>
    <published>2024-02-10T15:17:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3554e02b-34f8-4edd-b1c2-2cce5a8962b8/export</id>
    <title>3554e02b-34f8-4edd-b1c2-2cce5a8962b8</title>
    <updated>2026-05-04T06:12:04.368342+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3554e02b-34f8-4edd-b1c2-2cce5a8962b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51735\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface.  A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.\n\n\ud83d\udccf Published: 2024-01-17T07:15:02.550Z\n\ud83d\udccf Modified: 2025-06-09T17:18:03.079Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;amp;VLCODE=CIVN-2024-0013", "creation_timestamp": "2025-06-09T18:11:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3554e02b-34f8-4edd-b1c2-2cce5a8962b8/export"/>
    <published>2025-06-09T18:11:32+00:00</published>
  </entry>
</feed>
