<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T22:23:57.819181+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/06691a80-3205-4322-b2b9-b342d6b55ce9/export</id>
    <title>06691a80-3205-4322-b2b9-b342d6b55ce9</title>
    <updated>2026-04-30T22:23:58.346379+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "06691a80-3205-4322-b2b9-b342d6b55ce9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24295", "type": "seen", "source": "https://t.me/cibsecurity/60633", "content": "\u203c CVE-2023-24295 \u203c\n\nA stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows attackers to execute arbitrary code after opening a crafted PDF file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T01:36:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/06691a80-3205-4322-b2b9-b342d6b55ce9/export"/>
    <published>2023-03-24T01:36:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57d45606-9c93-437b-b2cc-323f0f72221d/export</id>
    <title>57d45606-9c93-437b-b2cc-323f0f72221d</title>
    <updated>2026-04-30T22:23:58.346311+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "57d45606-9c93-437b-b2cc-323f0f72221d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2429", "type": "seen", "source": "https://t.me/cibsecurity/63116", "content": "\u203c CVE-2023-2429 \u203c\n\nImproper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-30T19:35:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57d45606-9c93-437b-b2cc-323f0f72221d/export"/>
    <published>2023-04-30T19:35:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/919ae7d7-51f1-4d4d-a5fe-6cb9f9e0d0fc/export</id>
    <title>919ae7d7-51f1-4d4d-a5fe-6cb9f9e0d0fc</title>
    <updated>2026-04-30T22:23:58.346124+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "919ae7d7-51f1-4d4d-a5fe-6cb9f9e0d0fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24294", "type": "seen", "source": "https://t.me/ctinow/156816", "content": "https://ift.tt/G39OhDy\nCVE-2023-24294 | Zumtobel Netlink CCD Onboard up to 3.80 SetDeviceIdentification buffer overflow", "creation_timestamp": "2023-12-20T09:12:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/919ae7d7-51f1-4d4d-a5fe-6cb9f9e0d0fc/export"/>
    <published>2023-12-20T09:12:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e9737dd7-415b-40bd-a5bb-6ba745ba27d9/export</id>
    <title>e9737dd7-415b-40bd-a5bb-6ba745ba27d9</title>
    <updated>2026-04-30T22:23:58.344629+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9737dd7-415b-40bd-a5bb-6ba745ba27d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2429", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2429\n\ud83d\udd25 CVSS Score: 6.5 (CVSS_V3)\n\ud83d\udd39 Description: phpMyFAQ prior to version 3.1.13 does not properly validate email addresses when updating user profiles. This vulnerability allows an attacker to manipulate their email address and change it to another email address that is already registered in the system, including email addresses belonging to other users such as the administrator. Once the attacker has control of the other user's email address, they can request to remove the user from the system, leading to a loss of data and access.\n\ud83d\udccf Published: 2023-04-30T03:30:26Z\n\ud83d\udccf Modified: 2025-01-30T18:55:32Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-2429\n2. https://github.com/thorsten/phpmyfaq/commit/07552f5577ff8b1e6f7cdefafcce9b2a744d3a24\n3. https://github.com/thorsten/phpmyfaq\n4. https://huntr.com/bounties/20d3a0b3-2693-4bf1-b196-10741201a540\n5. https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540", "creation_timestamp": "2025-01-30T19:12:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9737dd7-415b-40bd-a5bb-6ba745ba27d9/export"/>
    <published>2025-01-30T19:12:34+00:00</published>
  </entry>
</feed>
