<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T05:20:52.490955+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/bf06d65c-837c-4aa8-a542-ccf0f5f17c65/export</id>
    <title>bf06d65c-837c-4aa8-a542-ccf0f5f17c65</title>
    <updated>2026-05-04T05:20:52.881701+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf06d65c-837c-4aa8-a542-ccf0f5f17c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-MR56-56J8-X6R4", "type": "seen", "source": "https://t.me/arpsyndicate/3336", "content": "#ExploitObserverAlert\n\nGHSA-mr56-56j8-x6r4\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-mr56-56j8-x6r4. An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project", "creation_timestamp": "2024-01-29T10:10:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf06d65c-837c-4aa8-a542-ccf0f5f17c65/export"/>
    <published>2024-01-29T10:10:07+00:00</published>
  </entry>
</feed>
