<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T10:45:54.167941+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e0a933b5-5dd2-4220-856f-f2dc1d36b011/export</id>
    <title>e0a933b5-5dd2-4220-856f-f2dc1d36b011</title>
    <updated>2026-05-17T10:45:54.560991+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e0a933b5-5dd2-4220-856f-f2dc1d36b011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/ctinow/162619", "content": "https://ift.tt/kFqR3bO\nCVE-2023-6338", "creation_timestamp": "2024-01-03T22:27:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0a933b5-5dd2-4220-856f-f2dc1d36b011/export"/>
    <published>2024-01-03T22:27:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cf9eec2e-922f-431c-9271-34a858314a48/export</id>
    <title>cf9eec2e-922f-431c-9271-34a858314a48</title>
    <updated>2026-05-17T10:45:54.560696+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cf9eec2e-922f-431c-9271-34a858314a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/cibsecurity/74345", "content": "\u203c\ufe0fCVE-2023-6338\u203c\ufe0f\n\nUncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client UDC that could allow an attacker with local access to execute code with elevated privileges.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cf9eec2e-922f-431c-9271-34a858314a48/export"/>
    <published>2024-01-04T01:37:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/230c8bdb-7066-4890-892b-3e37322b9d51/export</id>
    <title>230c8bdb-7066-4890-892b-3e37322b9d51</title>
    <updated>2026-05-17T10:45:54.558093+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "230c8bdb-7066-4890-892b-3e37322b9d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/arpsyndicate/2492", "content": "#ExploitObserverAlert\n\nCVE-2023-6338\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6338. Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.\n\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-05T16:26:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/230c8bdb-7066-4890-892b-3e37322b9d51/export"/>
    <published>2024-01-05T16:26:26+00:00</published>
  </entry>
</feed>
