<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-18T05:50:05.087407+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c0f78237-cb76-4bdf-a129-4c09bba0ae90/export</id>
    <title>c0f78237-cb76-4bdf-a129-4c09bba0ae90</title>
    <updated>2026-05-18T05:50:05.383143+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c0f78237-cb76-4bdf-a129-4c09bba0ae90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27500", "type": "seen", "source": "https://t.me/true_secator/4175", "content": "SAP \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f 19 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u044f\u0442\u044c \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438.\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0446\u0435\u043b\u0443\u044e \u043b\u0438\u043d\u0435\u0439\u043a\u0443 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0432\u043b\u0438\u044f\u044e\u0442 \u043d\u0430 SAP Business Objects Business Intelligence Platform (CMC) \u0438 SAP NetWeaver.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 CVE-2023-25616 - \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c 9.9 \u043f\u043e CVSS \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 SAP Business Intelligence Platform, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 420 \u0438 430.\n\n\u0414\u0440\u0443\u0433\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2023-23857 (CVSS v3: 9.8) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0438 DoS, \u0432\u043b\u0438\u044f\u044f \u043d\u0430 SAP NetWeaver AS \u0434\u043b\u044f Java, \u0432\u0435\u0440\u0441\u0438\u0438 7.50.\n\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u044f\u0441\u044c \u043a \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u043b\u0443\u0436\u0431\u0430\u043c \u0447\u0435\u0440\u0435\u0437 API \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430.\n\nCVE-2023-27269 - \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 (CVSS v3: 9.6) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043e\u0431\u0445\u043e\u0434\u0430 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430 \u0438 \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 SAP NetWeaver \u0434\u043b\u044f ABAP.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0431\u0435\u0437 \u043f\u0440\u0430\u0432 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 700 - 702, 731, 740, 750 - 757 \u0438 791.\n\nCVE-2023-27500 \u0438\u043c\u0435\u0435\u0442 CVSS v3: 9.6) \u0438 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043e\u0431\u0445\u043e\u0434\u043e\u043c \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430 \u0432 SAP NetWeaver AS \u0434\u043b\u044f ABAP.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 SAPRSBRO \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u0438. \u0423\u0434\u0430\u0440\u044b \u0432\u0435\u0440\u0441\u0438\u0439 700 - 702, 731, 740, 750 - 757.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0438\u0437 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 CVE-2023-25617 (CVSS v3: 9.0) \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 SAP Business Objects Business Intelligence, \u0432\u0435\u0440\u0441\u0438\u0438 420 \u0438 430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u041e\u0421 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0430\u043d\u0435\u043b\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 BI, \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u043d\u0441\u043e\u043b\u044c \u0438\u043b\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0433\u043e Java SDK \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0432\u044b\u0448\u0435\u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 SAP \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0438 10 \u0441\u0440\u0435\u0434\u043d\u0435\u0439.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0442\u043e\u0442 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e SAP \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c ERP, \u0438\u043c\u0435\u044e\u0449\u0438\u043c 24% \u0434\u043e\u043b\u0438 \u043c\u0438\u0440\u043e\u0432\u043e\u0433\u043e \u0440\u044b\u043d\u043a\u0430 \u0441 425 000 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 180 \u0441\u0442\u0440\u0430\u043d\u0430\u0445, \u0430 90% \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0432\u0445\u043e\u0434\u0438\u0442 \u0432 \u0441\u043f\u0438\u0441\u043e\u043a Forbes Global 2000, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u0435\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u0442\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043d\u0438\u043c\u0438 \u0440\u0438\u0441\u043a\u0438.", "creation_timestamp": "2023-03-16T13:40:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c0f78237-cb76-4bdf-a129-4c09bba0ae90/export"/>
    <published>2023-03-16T13:40:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/335b5b6e-adf8-4a8f-b0e2-eac621662548/export</id>
    <title>335b5b6e-adf8-4a8f-b0e2-eac621662548</title>
    <updated>2026-05-18T05:50:05.383045+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "335b5b6e-adf8-4a8f-b0e2-eac621662548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27507", "type": "seen", "source": "https://t.me/cibsecurity/64601", "content": "\u203c CVE-2023-27507 \u203c\n\nMicroEngine Mailform version 1.1.0 to 1.1.8 contains a path traversal vulnerability. If the product's file upload function and server save option are enabled, a remote attacker may save an arbitrary file on the server and execute it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-23T07:25:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/335b5b6e-adf8-4a8f-b0e2-eac621662548/export"/>
    <published>2023-05-23T07:25:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/980bd934-72d3-4657-85e3-315f0442c1ba/export</id>
    <title>980bd934-72d3-4657-85e3-315f0442c1ba</title>
    <updated>2026-05-18T05:50:05.382947+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "980bd934-72d3-4657-85e3-315f0442c1ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2750", "type": "seen", "source": "https://t.me/cibsecurity/64676", "content": "\u203c CVE-2023-2750 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T16:26:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/980bd934-72d3-4657-85e3-315f0442c1ba/export"/>
    <published>2023-05-24T16:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/837acaf3-f6ad-4285-9c6e-81b1743ffc2c/export</id>
    <title>837acaf3-f6ad-4285-9c6e-81b1743ffc2c</title>
    <updated>2026-05-18T05:50:05.382854+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "837acaf3-f6ad-4285-9c6e-81b1743ffc2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27509", "type": "seen", "source": "https://t.me/cibsecurity/68292", "content": "\u203c CVE-2023-27509 \u203c\n\nImproper access control in some Intel(R) ISPC software installers before version 1.19.0 may allow an authenticated user to potentially enable escalation of privileges via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:29:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/837acaf3-f6ad-4285-9c6e-81b1743ffc2c/export"/>
    <published>2023-08-11T07:29:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/de1adb45-4c60-4f34-ba2e-1cc465bbaa19/export</id>
    <title>de1adb45-4c60-4f34-ba2e-1cc465bbaa19</title>
    <updated>2026-05-18T05:50:05.382753+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "de1adb45-4c60-4f34-ba2e-1cc465bbaa19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27505", "type": "seen", "source": "https://t.me/cibsecurity/68317", "content": "\u203c CVE-2023-27505 \u203c\n\nIncorrect default permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installers before version 22.1 .1 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:32:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/de1adb45-4c60-4f34-ba2e-1cc465bbaa19/export"/>
    <published>2023-08-11T07:32:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e3d28b58-361c-4335-897b-61286ee8ee2d/export</id>
    <title>e3d28b58-361c-4335-897b-61286ee8ee2d</title>
    <updated>2026-05-18T05:50:05.382660+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e3d28b58-361c-4335-897b-61286ee8ee2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27502", "type": "seen", "source": "https://t.me/ctinow/208002", "content": "https://ift.tt/2tPDoQ9\nCVE-2023-27502", "creation_timestamp": "2024-03-14T18:22:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e3d28b58-361c-4335-897b-61286ee8ee2d/export"/>
    <published>2024-03-14T18:22:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9ed097a5-3f1d-477e-8551-619ef7f2f265/export</id>
    <title>9ed097a5-3f1d-477e-8551-619ef7f2f265</title>
    <updated>2026-05-18T05:50:05.382564+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9ed097a5-3f1d-477e-8551-619ef7f2f265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27502", "type": "seen", "source": "https://t.me/ctinow/208019", "content": "https://ift.tt/2tPDoQ9\nCVE-2023-27502", "creation_timestamp": "2024-03-14T18:26:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9ed097a5-3f1d-477e-8551-619ef7f2f265/export"/>
    <published>2024-03-14T18:26:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/42ff2c3e-b851-4709-961c-57c023f28c32/export</id>
    <title>42ff2c3e-b851-4709-961c-57c023f28c32</title>
    <updated>2026-05-18T05:50:05.382454+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "42ff2c3e-b851-4709-961c-57c023f28c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2750", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1962", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2750\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.\n\n\n\ud83d\udccf Published: 2023-05-24T11:44:39.395Z\n\ud83d\udccf Modified: 2025-01-16T15:38:28.748Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-23-0286", "creation_timestamp": "2025-01-16T15:56:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/42ff2c3e-b851-4709-961c-57c023f28c32/export"/>
    <published>2025-01-16T15:56:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b23108f5-ab14-45e6-b19b-19f93ce0d909/export</id>
    <title>b23108f5-ab14-45e6-b19b-19f93ce0d909</title>
    <updated>2026-05-18T05:50:05.382315+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b23108f5-ab14-45e6-b19b-19f93ce0d909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27507", "type": "seen", "source": "Telegram/NTyrE4L0Fb2ab6aMbJRTTuLV5hbNIV70X3c-BZfH8RHKjeJn", "content": "", "creation_timestamp": "2025-02-01T17:28:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b23108f5-ab14-45e6-b19b-19f93ce0d909/export"/>
    <published>2025-02-01T17:28:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ea4d9e0e-a2e4-4858-a638-f48bc69def9d/export</id>
    <title>ea4d9e0e-a2e4-4858-a638-f48bc69def9d</title>
    <updated>2026-05-18T05:50:05.380671+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ea4d9e0e-a2e4-4858-a638-f48bc69def9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27500", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/43ff9e04-da8f-45fe-a06a-e8f9b84a2d14", "content": "", "creation_timestamp": "2025-09-11T13:37:23.512990Z"}</content>
    <link href="https://db.gcve.eu/sighting/ea4d9e0e-a2e4-4858-a638-f48bc69def9d/export"/>
    <published>2025-09-11T13:37:23.512990+00:00</published>
  </entry>
</feed>
