<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T11:57:08.610647+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/286cda14-4820-4895-a1a4-a764cc479aef/export</id>
    <title>286cda14-4820-4895-a1a4-a764cc479aef</title>
    <updated>2026-05-20T11:57:09.039356+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "286cda14-4820-4895-a1a4-a764cc479aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39308", "type": "seen", "source": "https://t.me/cibsecurity/71306", "content": "\u203c CVE-2023-39308 \u203c\n\nUnauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin &amp;lt;=\u00c2\u00a01.0.7 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T18:37:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/286cda14-4820-4895-a1a4-a764cc479aef/export"/>
    <published>2023-09-29T18:37:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/388bd799-e365-4b5f-91e5-dbdcc2ca9edc/export</id>
    <title>388bd799-e365-4b5f-91e5-dbdcc2ca9edc</title>
    <updated>2026-05-20T11:57:09.039303+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "388bd799-e365-4b5f-91e5-dbdcc2ca9edc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39302", "type": "seen", "source": "https://t.me/ctinow/178168", "content": "https://ift.tt/0KiSGA7\nCVE-2023-39302", "creation_timestamp": "2024-02-02T17:26:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/388bd799-e365-4b5f-91e5-dbdcc2ca9edc/export"/>
    <published>2024-02-02T17:26:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/63f75535-1db1-421d-9924-1f0c98220083/export</id>
    <title>63f75535-1db1-421d-9924-1f0c98220083</title>
    <updated>2026-05-20T11:57:09.039251+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "63f75535-1db1-421d-9924-1f0c98220083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39303", "type": "seen", "source": "https://t.me/ctinow/178169", "content": "https://ift.tt/QMacm37\nCVE-2023-39303", "creation_timestamp": "2024-02-02T17:26:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/63f75535-1db1-421d-9924-1f0c98220083/export"/>
    <published>2024-02-02T17:26:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5c8d4fdb-5f5c-4225-a0ad-f21fbe24ad38/export</id>
    <title>5c8d4fdb-5f5c-4225-a0ad-f21fbe24ad38</title>
    <updated>2026-05-20T11:57:09.039198+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5c8d4fdb-5f5c-4225-a0ad-f21fbe24ad38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39302", "type": "seen", "source": "https://t.me/ctinow/192831", "content": "https://ift.tt/4DAzuxE\nCVE-2023-39302 | QNAP QTS/QuTS hero/QuTScloud os command injection (qsa-23-33)", "creation_timestamp": "2024-02-25T11:11:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5c8d4fdb-5f5c-4225-a0ad-f21fbe24ad38/export"/>
    <published>2024-02-25T11:11:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/06968c5a-b172-43bb-b301-9a6a603cef83/export</id>
    <title>06968c5a-b172-43bb-b301-9a6a603cef83</title>
    <updated>2026-05-20T11:57:09.039127+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "06968c5a-b172-43bb-b301-9a6a603cef83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39303", "type": "seen", "source": "https://t.me/ctinow/192832", "content": "https://ift.tt/eo0HkBL\nCVE-2023-39303 | QNAP QTS/QuTS hero/QuTScloud improper authentication (qsa-23-33)", "creation_timestamp": "2024-02-25T11:11:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/06968c5a-b172-43bb-b301-9a6a603cef83/export"/>
    <published>2024-02-25T11:11:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/377abeba-3d07-4f67-916a-b284de7332d1/export</id>
    <title>377abeba-3d07-4f67-916a-b284de7332d1</title>
    <updated>2026-05-20T11:57:09.039039+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "377abeba-3d07-4f67-916a-b284de7332d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39305", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647168642054927", "content": "", "creation_timestamp": "2024-12-13T19:29:34.855213Z"}</content>
    <link href="https://db.gcve.eu/sighting/377abeba-3d07-4f67-916a-b284de7332d1/export"/>
    <published>2024-12-13T19:29:34.855213+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b60cb5fb-7987-4d4a-a2f4-74d6abd51eb8/export</id>
    <title>b60cb5fb-7987-4d4a-a2f4-74d6abd51eb8</title>
    <updated>2026-05-20T11:57:09.037611+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b60cb5fb-7987-4d4a-a2f4-74d6abd51eb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3930", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulp7raun2x", "content": "", "creation_timestamp": "2025-02-11T02:16:41.782284Z"}</content>
    <link href="https://db.gcve.eu/sighting/b60cb5fb-7987-4d4a-a2f4-74d6abd51eb8/export"/>
    <published>2025-02-11T02:16:41.782284+00:00</published>
  </entry>
</feed>
