<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T14:37:49.992693+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0de7254a-5a71-4867-a47d-b0401d88dcfa/export</id>
    <title>0de7254a-5a71-4867-a47d-b0401d88dcfa</title>
    <updated>2026-05-08T14:37:50.300429+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0de7254a-5a71-4867-a47d-b0401d88dcfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7186", "type": "seen", "source": "https://t.me/ctinow/161090", "content": "https://ift.tt/tbOH3kI\nCVE-2023-7186", "creation_timestamp": "2023-12-31T14:26:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0de7254a-5a71-4867-a47d-b0401d88dcfa/export"/>
    <published>2023-12-31T14:26:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf505406-c785-4fe8-bcc6-f3422514f364/export</id>
    <title>bf505406-c785-4fe8-bcc6-f3422514f364</title>
    <updated>2026-05-08T14:37:50.300340+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf505406-c785-4fe8-bcc6-f3422514f364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7186", "type": "seen", "source": "https://t.me/cibsecurity/74068", "content": "\u203c\ufe0fCVE-2023-7186\u203c\ufe0f\n\nA vulnerability was found in 7card Fakabao up to 1.0build20230805. It has been declared as critical. This vulnerability affects unknown code of the file membernotify.php. The manipulation of the argument outtradeno leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB249388. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:32:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf505406-c785-4fe8-bcc6-f3422514f364/export"/>
    <published>2024-01-01T01:32:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/29920b39-640c-4301-aee1-0e75d1d03ff7/export</id>
    <title>29920b39-640c-4301-aee1-0e75d1d03ff7</title>
    <updated>2026-05-08T14:37:50.299225+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "29920b39-640c-4301-aee1-0e75d1d03ff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7186", "type": "seen", "source": "https://t.me/ctinow/171023", "content": "https://ift.tt/Ds4Tg5p\nCVE-2023-7186 | 7-card Fakabao up to 1.0_build20230805 member/notify.php out_trade_no sql injection", "creation_timestamp": "2024-01-22T08:36:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/29920b39-640c-4301-aee1-0e75d1d03ff7/export"/>
    <published>2024-01-22T08:36:17+00:00</published>
  </entry>
</feed>
