<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T15:17:47.293967+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/243065d8-67e2-4fa8-861e-105941889a9f/export</id>
    <title>243065d8-67e2-4fa8-861e-105941889a9f</title>
    <updated>2026-05-05T15:17:47.654574+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "243065d8-67e2-4fa8-861e-105941889a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179858", "content": "https://ift.tt/bqDpgVa\nCVE-2023-45231 | TianoCore EDK2 stable202308 out-of-bounds (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T09:41:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/243065d8-67e2-4fa8-861e-105941889a9f/export"/>
    <published>2024-02-06T09:41:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a32e892e-5450-4df9-ad80-222ca98c8c9b/export</id>
    <title>a32e892e-5450-4df9-ad80-222ca98c8c9b</title>
    <updated>2026-05-05T15:17:47.654505+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a32e892e-5450-4df9-ad80-222ca98c8c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179865", "content": "https://ift.tt/jWh1nxS\nCVE-2023-45229 | TianoCore EDK2 stable202308 DHCPv6 Advertise Message IA_NA/IA_TA out-of-bounds (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a32e892e-5450-4df9-ad80-222ca98c8c9b/export"/>
    <published>2024-02-06T10:11:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/aa814c07-7538-40f8-8956-3e734fdc9840/export</id>
    <title>aa814c07-7538-40f8-8956-3e734fdc9840</title>
    <updated>2026-05-05T15:17:47.654433+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "aa814c07-7538-40f8-8956-3e734fdc9840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179866", "content": "https://ift.tt/KyMPmE2\nCVE-2023-45230 | TianoCore EDK2 stable202308 DHCPv6 Client buffer overflow (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/aa814c07-7538-40f8-8956-3e734fdc9840/export"/>
    <published>2024-02-06T10:11:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e9f6ee60-2955-4491-b888-8448f5ab529f/export</id>
    <title>e9f6ee60-2955-4491-b888-8448f5ab529f</title>
    <updated>2026-05-05T15:17:47.654361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9f6ee60-2955-4491-b888-8448f5ab529f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179867", "content": "https://ift.tt/6VWtNYZ\nCVE-2023-45232 | TianoCore EDK2 stable202308 IPv6 Options Header infinite loop (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9f6ee60-2955-4491-b888-8448f5ab529f/export"/>
    <published>2024-02-06T10:11:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2642dd44-8799-44c5-9ca2-aea7cd5eeac0/export</id>
    <title>2642dd44-8799-44c5-9ca2-aea7cd5eeac0</title>
    <updated>2026-05-05T15:17:47.654285+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2642dd44-8799-44c5-9ca2-aea7cd5eeac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179868", "content": "https://ift.tt/Lh0ties\nCVE-2023-45234 | TianoCore EDK2 stable202308 DHCPv6 Advertise Message buffer overflow (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2642dd44-8799-44c5-9ca2-aea7cd5eeac0/export"/>
    <published>2024-02-06T10:11:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/df517c20-6a62-4460-8996-789df353a86d/export</id>
    <title>df517c20-6a62-4460-8996-789df353a86d</title>
    <updated>2026-05-05T15:17:47.654209+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "df517c20-6a62-4460-8996-789df353a86d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179869", "content": "https://ift.tt/DWpjE0q\nCVE-2023-45235 | TianoCore EDK2 stable202308 DHCPv6 Proxy Advertise Message buffer overflow (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/df517c20-6a62-4460-8996-789df353a86d/export"/>
    <published>2024-02-06T10:11:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/28a72f89-86c5-4952-9111-0f6afd261193/export</id>
    <title>28a72f89-86c5-4952-9111-0f6afd261193</title>
    <updated>2026-05-05T15:17:47.654100+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "28a72f89-86c5-4952-9111-0f6afd261193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179870", "content": "https://ift.tt/DHx2rp1\nCVE-2023-45236 | TianoCore EDK2 stable202308 TCP Initial Sequence Number information disclosure (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/28a72f89-86c5-4952-9111-0f6afd261193/export"/>
    <published>2024-02-06T10:11:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b7032137-0d96-40d1-9cf3-57d119e15d95/export</id>
    <title>b7032137-0d96-40d1-9cf3-57d119e15d95</title>
    <updated>2026-05-05T15:17:47.652809+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b7032137-0d96-40d1-9cf3-57d119e15d95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HC6X-CW6P-GJ7H", "type": "seen", "source": "https://t.me/ctinow/179871", "content": "https://ift.tt/o0iAm3R\nCVE-2023-45237 | TianoCore EDK2 stable202308 TCP Initial Sequence Number weak prng (GHSA-hc6x-cw6p-gj7h)", "creation_timestamp": "2024-02-06T10:11:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b7032137-0d96-40d1-9cf3-57d119e15d95/export"/>
    <published>2024-02-06T10:11:18+00:00</published>
  </entry>
</feed>
