<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:45:12.689224+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ca891a97-0f97-4d1a-879d-8e98e9ba4254/export</id>
    <title>ca891a97-0f97-4d1a-879d-8e98e9ba4254</title>
    <updated>2026-05-06T19:45:13.298075+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ca891a97-0f97-4d1a-879d-8e98e9ba4254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR6X-48QQ-2PX8", "type": "seen", "source": "https://t.me/arpsyndicate/2243", "content": "#ExploitObserverAlert\n\nGHSA-fr6x-48qq-2px8\n\nDESCRIPTION: Exploit Observer has 2 entries related to GHSA-FR6X-48QQ-2PX8. A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222359.\n\nGHSS: 5.5", "creation_timestamp": "2023-12-29T11:40:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ca891a97-0f97-4d1a-879d-8e98e9ba4254/export"/>
    <published>2023-12-29T11:40:21+00:00</published>
  </entry>
</feed>
