<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T21:13:22.437797+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/602aba97-4c74-4304-9669-6becd9ac9fe4/export</id>
    <title>602aba97-4c74-4304-9669-6becd9ac9fe4</title>
    <updated>2026-05-09T21:13:22.698606+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "602aba97-4c74-4304-9669-6becd9ac9fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/ctinow/187077", "content": "https://ift.tt/JXEw3cW\nCVE-2023-52355 | LibTIFF TIFFRasterScanlineSize64 resource consumption (Issue 621)", "creation_timestamp": "2024-02-17T23:51:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/602aba97-4c74-4304-9669-6becd9ac9fe4/export"/>
    <published>2024-02-17T23:51:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7a5bcdfc-4af4-4449-ae86-2913d802136d/export</id>
    <title>7a5bcdfc-4af4-4449-ae86-2913d802136d</title>
    <updated>2026-05-09T21:13:22.698546+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7a5bcdfc-4af4-4449-ae86-2913d802136d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52357", "type": "seen", "source": "https://t.me/ctinow/187093", "content": "https://ift.tt/92oWsdU\nCVE-2023-52357", "creation_timestamp": "2024-02-18T04:26:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7a5bcdfc-4af4-4449-ae86-2913d802136d/export"/>
    <published>2024-02-18T04:26:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e9230cb8-9466-48d1-b852-2ff447cbea59/export</id>
    <title>e9230cb8-9466-48d1-b852-2ff447cbea59</title>
    <updated>2026-05-09T21:13:22.698487+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9230cb8-9466-48d1-b852-2ff447cbea59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52358", "type": "seen", "source": "https://t.me/ctinow/187094", "content": "https://ift.tt/g7xIENK\nCVE-2023-52358", "creation_timestamp": "2024-02-18T04:26:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9230cb8-9466-48d1-b852-2ff447cbea59/export"/>
    <published>2024-02-18T04:26:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a4f0590e-eddb-419f-b101-b2de677c2b2c/export</id>
    <title>a4f0590e-eddb-419f-b101-b2de677c2b2c</title>
    <updated>2026-05-09T21:13:22.698426+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a4f0590e-eddb-419f-b101-b2de677c2b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52357", "type": "seen", "source": "https://t.me/ctinow/187103", "content": "https://ift.tt/92oWsdU\nCVE-2023-52357", "creation_timestamp": "2024-02-18T04:31:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a4f0590e-eddb-419f-b101-b2de677c2b2c/export"/>
    <published>2024-02-18T04:31:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b4cad839-cc9e-4f11-8f29-f633b2877c33/export</id>
    <title>b4cad839-cc9e-4f11-8f29-f633b2877c33</title>
    <updated>2026-05-09T21:13:22.698361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b4cad839-cc9e-4f11-8f29-f633b2877c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52358", "type": "seen", "source": "https://t.me/ctinow/187104", "content": "https://ift.tt/g7xIENK\nCVE-2023-52358", "creation_timestamp": "2024-02-18T04:31:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b4cad839-cc9e-4f11-8f29-f633b2877c33/export"/>
    <published>2024-02-18T04:31:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/570951ec-b507-4660-b515-2746d52ee11c/export</id>
    <title>570951ec-b507-4660-b515-2746d52ee11c</title>
    <updated>2026-05-09T21:13:22.698293+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "570951ec-b507-4660-b515-2746d52ee11c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52356", "type": "seen", "source": "https://t.me/ctinow/187133", "content": "https://ift.tt/gj6ihNf\nCVE-2023-52356 | LibTIFF TIFFReadRGBATileExt denial of service (Issue 622)", "creation_timestamp": "2024-02-18T06:36:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/570951ec-b507-4660-b515-2746d52ee11c/export"/>
    <published>2024-02-18T06:36:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/728edda1-842c-48b8-922b-bdd559b7c9ec/export</id>
    <title>728edda1-842c-48b8-922b-bdd559b7c9ec</title>
    <updated>2026-05-09T21:13:22.698219+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "728edda1-842c-48b8-922b-bdd559b7c9ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52352", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9444", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52352\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Network Adapter Service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed\n\ud83d\udccf Published: 2024-04-08T02:21:17.681Z\n\ud83d\udccf Modified: 2025-03-28T19:11:14.459Z\n\ud83d\udd17 References:\n1. https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313", "creation_timestamp": "2025-03-28T19:29:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/728edda1-842c-48b8-922b-bdd559b7c9ec/export"/>
    <published>2025-03-28T19:29:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/da321d3b-f154-4159-92f8-e8933984dd5e/export</id>
    <title>da321d3b-f154-4159-92f8-e8933984dd5e</title>
    <updated>2026-05-09T21:13:22.698124+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "da321d3b-f154-4159-92f8-e8933984dd5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14528", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52355\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.\n\ud83d\udccf Published: 2024-01-25T20:03:35.031Z\n\ud83d\udccf Modified: 2025-05-02T17:06:07.869Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2023-52355\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2251326\n3. https://gitlab.com/libtiff/libtiff/-/issues/621", "creation_timestamp": "2025-05-02T17:16:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/da321d3b-f154-4159-92f8-e8933984dd5e/export"/>
    <published>2025-05-02T17:16:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3b980edb-287e-4a13-af60-8c5af454a529/export</id>
    <title>3b980edb-287e-4a13-af60-8c5af454a529</title>
    <updated>2026-05-09T21:13:22.697549+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3b980edb-287e-4a13-af60-8c5af454a529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5235", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5235\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not limit which options can be updated via some of its AJAX actions, which may allow attackers with a subscriber+ account to update blog options, such as 'users_can_register' and 'default_role'. It also unserializes user input in the process, which may lead to Object Injection attacks.\n\ud83d\udccf Published: 2024-01-08T19:00:36.131Z\n\ud83d\udccf Modified: 2025-06-11T17:05:31.530Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db", "creation_timestamp": "2025-06-11T17:34:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3b980edb-287e-4a13-af60-8c5af454a529/export"/>
    <published>2025-06-11T17:34:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4eba576b-ae48-4e90-b9b1-1df045cc83d7/export</id>
    <title>4eba576b-ae48-4e90-b9b1-1df045cc83d7</title>
    <updated>2026-05-09T21:13:22.696033+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4eba576b-ae48-4e90-b9b1-1df045cc83d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2023-52356", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mj5xwcy4yc2q", "content": "", "creation_timestamp": "2026-04-10T18:40:48.815551Z"}</content>
    <link href="https://db.gcve.eu/sighting/4eba576b-ae48-4e90-b9b1-1df045cc83d7/export"/>
    <published>2026-04-10T18:40:48.815551+00:00</published>
  </entry>
</feed>
