<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T03:24:56.118015+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8c01833e-9457-4509-be27-c674cfd0bd7c/export</id>
    <title>8c01833e-9457-4509-be27-c674cfd0bd7c</title>
    <updated>2026-05-16T03:24:56.473610+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8c01833e-9457-4509-be27-c674cfd0bd7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7193", "type": "seen", "source": "https://t.me/ctinow/161152", "content": "https://ift.tt/H1t6bBR\nCVE-2023-7193", "creation_timestamp": "2023-12-31T18:26:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8c01833e-9457-4509-be27-c674cfd0bd7c/export"/>
    <published>2023-12-31T18:26:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/04c6ae6a-7634-467a-8568-dc1f4f823e39/export</id>
    <title>04c6ae6a-7634-467a-8568-dc1f4f823e39</title>
    <updated>2026-05-16T03:24:56.473504+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "04c6ae6a-7634-467a-8568-dc1f4f823e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7193", "type": "seen", "source": "https://t.me/cibsecurity/74076", "content": "\u203c\ufe0fCVE-2023-7193\u203c\ufe0f\n\nA vulnerability was found in MTab Bookmark up to 1.2.6 and classified as critical. This issue affects some unknown processing of the file publicinstall.php of the component Installation. The manipulation leads to improper access controls. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249395. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:32:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/04c6ae6a-7634-467a-8568-dc1f4f823e39/export"/>
    <published>2024-01-01T01:32:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/11fc1859-06d6-4d6c-8377-d7d934366dc2/export</id>
    <title>11fc1859-06d6-4d6c-8377-d7d934366dc2</title>
    <updated>2026-05-16T03:24:56.471079+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "11fc1859-06d6-4d6c-8377-d7d934366dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7193", "type": "seen", "source": "https://t.me/ctinow/171040", "content": "https://ift.tt/jGzMEwL\nCVE-2023-7193 | MTab Bookmark up to 1.2.6 Installation public/install.php access control", "creation_timestamp": "2024-01-22T09:11:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/11fc1859-06d6-4d6c-8377-d7d934366dc2/export"/>
    <published>2024-01-22T09:11:17+00:00</published>
  </entry>
</feed>
