<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T21:54:51.478181+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/398c8c6e-9c35-45c0-afac-ffd2ea5824ad/export</id>
    <title>398c8c6e-9c35-45c0-afac-ffd2ea5824ad</title>
    <updated>2026-05-02T21:54:51.749532+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "398c8c6e-9c35-45c0-afac-ffd2ea5824ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39191", "type": "seen", "source": "https://t.me/cibsecurity/71619", "content": "\u203c CVE-2023-39191 \u203c\n\nAn improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T22:12:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/398c8c6e-9c35-45c0-afac-ffd2ea5824ad/export"/>
    <published>2023-10-04T22:12:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0463779-153f-4133-842d-bf2b2bb1ab9e/export</id>
    <title>e0463779-153f-4133-842d-bf2b2bb1ab9e</title>
    <updated>2026-05-02T21:54:51.749479+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e0463779-153f-4133-842d-bf2b2bb1ab9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39192", "type": "seen", "source": "https://t.me/cibsecurity/71849", "content": "\u203c CVE-2023-39192 \u203c\n\nA flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0463779-153f-4133-842d-bf2b2bb1ab9e/export"/>
    <published>2023-10-09T22:16:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1b0d42ab-cfb0-4e8b-8b97-864d940490fc/export</id>
    <title>1b0d42ab-cfb0-4e8b-8b97-864d940490fc</title>
    <updated>2026-05-02T21:54:51.749428+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1b0d42ab-cfb0-4e8b-8b97-864d940490fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39194", "type": "seen", "source": "https://t.me/cibsecurity/71851", "content": "\u203c CVE-2023-39194 \u203c\n\nA flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1b0d42ab-cfb0-4e8b-8b97-864d940490fc/export"/>
    <published>2023-10-09T22:16:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cb382a11-823b-44e9-8f73-61282f206bfc/export</id>
    <title>cb382a11-823b-44e9-8f73-61282f206bfc</title>
    <updated>2026-05-02T21:54:51.749378+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb382a11-823b-44e9-8f73-61282f206bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39193", "type": "seen", "source": "https://t.me/cibsecurity/71858", "content": "\u203c CVE-2023-39193 \u203c\n\nA flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T22:16:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb382a11-823b-44e9-8f73-61282f206bfc/export"/>
    <published>2023-10-09T22:16:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/64d01746-26da-4688-8c7c-f86b5a46d9d5/export</id>
    <title>64d01746-26da-4688-8c7c-f86b5a46d9d5</title>
    <updated>2026-05-02T21:54:51.749328+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "64d01746-26da-4688-8c7c-f86b5a46d9d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39197", "type": "seen", "source": "https://t.me/ctinow/171669", "content": "https://ift.tt/GEZqY1u\nCVE-2023-39197", "creation_timestamp": "2024-01-23T04:21:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/64d01746-26da-4688-8c7c-f86b5a46d9d5/export"/>
    <published>2024-01-23T04:21:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c3c31753-60e0-4f24-a377-bc32253a7a6b/export</id>
    <title>c3c31753-60e0-4f24-a377-bc32253a7a6b</title>
    <updated>2026-05-02T21:54:51.749275+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c3c31753-60e0-4f24-a377-bc32253a7a6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39196", "type": "seen", "source": "https://t.me/ctinow/180714", "content": "https://ift.tt/NUpvg1o\nCVE-2023-39196", "creation_timestamp": "2024-02-07T14:21:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c3c31753-60e0-4f24-a377-bc32253a7a6b/export"/>
    <published>2024-02-07T14:21:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/77e366dc-9a3e-4d50-89dd-17b553a92228/export</id>
    <title>77e366dc-9a3e-4d50-89dd-17b553a92228</title>
    <updated>2026-05-02T21:54:51.749221+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "77e366dc-9a3e-4d50-89dd-17b553a92228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3919", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloxv2ny27", "content": "", "creation_timestamp": "2025-02-11T02:16:33.425165Z"}</content>
    <link href="https://db.gcve.eu/sighting/77e366dc-9a3e-4d50-89dd-17b553a92228/export"/>
    <published>2025-02-11T02:16:33.425165+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c7db1d1-0067-424c-a1dc-5c02b3dc56ed/export</id>
    <title>3c7db1d1-0067-424c-a1dc-5c02b3dc56ed</title>
    <updated>2026-05-02T21:54:51.749162+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3c7db1d1-0067-424c-a1dc-5c02b3dc56ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39193", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c7db1d1-0067-424c-a1dc-5c02b3dc56ed/export"/>
    <published>2025-02-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/40c8d427-ca28-4416-9022-0667b3938fdf/export</id>
    <title>40c8d427-ca28-4416-9022-0667b3938fdf</title>
    <updated>2026-05-02T21:54:51.749075+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "40c8d427-ca28-4416-9022-0667b3938fdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39192", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/40c8d427-ca28-4416-9022-0667b3938fdf/export"/>
    <published>2025-02-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/041c1b4a-8efb-4537-9690-8134cf4828df/export</id>
    <title>041c1b4a-8efb-4537-9690-8134cf4828df</title>
    <updated>2026-05-02T21:54:51.748032+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "041c1b4a-8efb-4537-9690-8134cf4828df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39198", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/041c1b4a-8efb-4537-9690-8134cf4828df/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
</feed>
