<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T14:37:47.983339+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/81ce5e6a-9da1-41f2-9511-9255b20940e5/export</id>
    <title>81ce5e6a-9da1-41f2-9511-9255b20940e5</title>
    <updated>2026-05-08T14:37:48.520691+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "81ce5e6a-9da1-41f2-9511-9255b20940e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7185", "type": "seen", "source": "https://t.me/ctinow/161078", "content": "https://ift.tt/JTFEm1j\nCVE-2023-7185", "creation_timestamp": "2023-12-31T13:26:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/81ce5e6a-9da1-41f2-9511-9255b20940e5/export"/>
    <published>2023-12-31T13:26:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a4bf8e77-74ba-456f-ac1f-aac63819c493/export</id>
    <title>a4bf8e77-74ba-456f-ac1f-aac63819c493</title>
    <updated>2026-05-08T14:37:48.520563+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a4bf8e77-74ba-456f-ac1f-aac63819c493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7185", "type": "seen", "source": "https://t.me/cibsecurity/74067", "content": "\u203c\ufe0fCVE-2023-7185\u203c\ufe0f\n\nA vulnerability was found in 7card Fakabao up to 1.0build20230805. It has been classified as critical. This affects an unknown part of the file shopwxpaynotify.php. The manipulation of the argument outtradeno leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249387. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:31:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a4bf8e77-74ba-456f-ac1f-aac63819c493/export"/>
    <published>2024-01-01T01:31:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f10c553-5dc3-4253-b4d2-6bd873c46268/export</id>
    <title>6f10c553-5dc3-4253-b4d2-6bd873c46268</title>
    <updated>2026-05-08T14:37:48.518632+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6f10c553-5dc3-4253-b4d2-6bd873c46268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7185", "type": "seen", "source": "https://t.me/ctinow/171019", "content": "https://ift.tt/KsV8xXF\nCVE-2023-7185 | 7-card Fakabao up to 1.0_build20230805 shop/wxpay_notify.php out_trade_no sql injection", "creation_timestamp": "2024-01-22T08:06:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f10c553-5dc3-4253-b4d2-6bd873c46268/export"/>
    <published>2024-01-22T08:06:49+00:00</published>
  </entry>
</feed>
