<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T11:30:41.243682+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/f666bae7-000c-4b69-bcb1-fbac2a19e9f4/export</id>
    <title>f666bae7-000c-4b69-bcb1-fbac2a19e9f4</title>
    <updated>2026-05-17T11:30:41.604741+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f666bae7-000c-4b69-bcb1-fbac2a19e9f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12810", "type": "seen", "source": "https://t.me/information_security_channel/19653", "content": "Adobe released security patches that fix multiple critical vulnerabilities with Adobe Photoshop CC 19.1.5 and earlier 19.x versions, as well as 18.1.5 and earlier 18.x versions for Windows and macOS. The vulnerability can be tracked as CVE-2018-12810 and CVE-2018-12811, the two critical memory corruption vulnerability allows a remote attacker to execute arbitrary code in the [\u2026]\nThe post Adobe Release Security Patches to Fix Critical Vulnerabilities for Adobe Photoshop (https://gbhackers.com/security-patches-photoshop/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2018-08-23T12:22:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f666bae7-000c-4b69-bcb1-fbac2a19e9f4/export"/>
    <published>2018-08-23T12:22:59+00:00</published>
  </entry>
</feed>
