<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T02:25:40.763028+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ecf9340d-e74a-4b62-96f2-348aefc2b348/export</id>
    <title>ecf9340d-e74a-4b62-96f2-348aefc2b348</title>
    <updated>2026-05-11T02:25:41.128032+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ecf9340d-e74a-4b62-96f2-348aefc2b348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46563", "type": "seen", "source": "https://t.me/cibsecurity/72885", "content": "\u203c CVE-2023-46563 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpQoS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ecf9340d-e74a-4b62-96f2-348aefc2b348/export"/>
    <published>2023-10-25T22:52:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5eeaa0d6-77b0-469b-97c6-32fb8e12407a/export</id>
    <title>5eeaa0d6-77b0-469b-97c6-32fb8e12407a</title>
    <updated>2026-05-11T02:25:41.127842+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5eeaa0d6-77b0-469b-97c6-32fb8e12407a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46562", "type": "seen", "source": "https://t.me/cibsecurity/72902", "content": "\u203c CVE-2023-46562 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDosCfg.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5eeaa0d6-77b0-469b-97c6-32fb8e12407a/export"/>
    <published>2023-10-25T22:52:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f5bf5980-0947-40d8-bf46-4883cf03613a/export</id>
    <title>f5bf5980-0947-40d8-bf46-4883cf03613a</title>
    <updated>2026-05-11T02:25:41.127651+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f5bf5980-0947-40d8-bf46-4883cf03613a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46569", "type": "seen", "source": "https://t.me/cibsecurity/73105", "content": "\u203c CVE-2023-46569 \u203c\n\nAn out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T07:22:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f5bf5980-0947-40d8-bf46-4883cf03613a/export"/>
    <published>2023-10-28T07:22:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dea6801a-ad16-4caa-89cd-cb654a72d7dc/export</id>
    <title>dea6801a-ad16-4caa-89cd-cb654a72d7dc</title>
    <updated>2026-05-11T02:25:41.127463+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dea6801a-ad16-4caa-89cd-cb654a72d7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4656", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpj342t2v", "content": "", "creation_timestamp": "2025-02-11T02:16:51.430696Z"}</content>
    <link href="https://db.gcve.eu/sighting/dea6801a-ad16-4caa-89cd-cb654a72d7dc/export"/>
    <published>2025-02-11T02:16:51.430696+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7946fa7a-5e84-478b-98a6-bb683d70a24a/export</id>
    <title>7946fa7a-5e84-478b-98a6-bb683d70a24a</title>
    <updated>2026-05-11T02:25:41.127242+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7946fa7a-5e84-478b-98a6-bb683d70a24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lukhzt6st32q", "content": "", "creation_timestamp": "2025-07-22T12:11:56.440401Z"}</content>
    <link href="https://db.gcve.eu/sighting/7946fa7a-5e84-478b-98a6-bb683d70a24a/export"/>
    <published>2025-07-22T12:11:56.440401+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2fdc5e58-4962-4ad9-98b8-94412e5b2b4e/export</id>
    <title>2fdc5e58-4962-4ad9-98b8-94412e5b2b4e</title>
    <updated>2026-05-11T02:25:41.125234+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2fdc5e58-4962-4ad9-98b8-94412e5b2b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3lukhzvro7xv2", "content": "", "creation_timestamp": "2025-07-22T12:12:39.107210Z"}</content>
    <link href="https://db.gcve.eu/sighting/2fdc5e58-4962-4ad9-98b8-94412e5b2b4e/export"/>
    <published>2025-07-22T12:12:39.107210+00:00</published>
  </entry>
</feed>
