<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T03:48:37.651023+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ba070668-d126-41bb-a67e-6a03388d1c81/export</id>
    <title>ba070668-d126-41bb-a67e-6a03388d1c81</title>
    <updated>2026-05-06T03:48:38.018028+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba070668-d126-41bb-a67e-6a03388d1c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50090", "type": "seen", "source": "https://t.me/ctinow/162599", "content": "https://ift.tt/TO5uYPn\nCVE-2023-50090", "creation_timestamp": "2024-01-03T21:27:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba070668-d126-41bb-a67e-6a03388d1c81/export"/>
    <published>2024-01-03T21:27:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4184143f-9712-4198-8748-7b612e567a0e/export</id>
    <title>4184143f-9712-4198-8748-7b612e567a0e</title>
    <updated>2026-05-06T03:48:38.017970+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4184143f-9712-4198-8748-7b612e567a0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50090", "type": "seen", "source": "https://t.me/cibsecurity/74340", "content": "\u203c\ufe0fCVE-2023-50090\u203c\ufe0f\n\nArbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4184143f-9712-4198-8748-7b612e567a0e/export"/>
    <published>2024-01-04T01:37:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1afb5971-20ab-43d6-a7fa-78a88ff37a2d/export</id>
    <title>1afb5971-20ab-43d6-a7fa-78a88ff37a2d</title>
    <updated>2026-05-06T03:48:38.017897+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1afb5971-20ab-43d6-a7fa-78a88ff37a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50090", "type": "seen", "source": "https://t.me/arpsyndicate/2497", "content": "#ExploitObserverAlert\n\nCVE-2023-50090\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50090. Arbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request.", "creation_timestamp": "2024-01-05T16:58:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1afb5971-20ab-43d6-a7fa-78a88ff37a2d/export"/>
    <published>2024-01-05T16:58:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b93e06b0-01ec-418e-8696-f3d8631f2c2e/export</id>
    <title>b93e06b0-01ec-418e-8696-f3d8631f2c2e</title>
    <updated>2026-05-06T03:48:38.015649+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b93e06b0-01ec-418e-8696-f3d8631f2c2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50090", "type": "seen", "source": "https://t.me/ctinow/172373", "content": "https://ift.tt/winNgf7\nCVE-2023-50090 | ureport2 up to 2.2.9 HTTP POST Request saveReportFile Privilege Escalation (GHSA-445x-c8qq-qfr9)", "creation_timestamp": "2024-01-23T23:02:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b93e06b0-01ec-418e-8696-f3d8631f2c2e/export"/>
    <published>2024-01-23T23:02:23+00:00</published>
  </entry>
</feed>
