<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T21:39:18.740054+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/891a809d-d6fe-416c-9aee-227f91a8ce02/export</id>
    <title>891a809d-d6fe-416c-9aee-227f91a8ce02</title>
    <updated>2026-05-20T21:39:19.133914+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "891a809d-d6fe-416c-9aee-227f91a8ce02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14867", "type": "seen", "source": "https://t.me/cibsecurity/5220", "content": "ATENTION\u203c New - CVE-2018-14867\n\nIncorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-28T22:29:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/891a809d-d6fe-416c-9aee-227f91a8ce02/export"/>
    <published>2019-06-28T22:29:37+00:00</published>
  </entry>
</feed>
