<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 15:14:33 +0000</lastBuildDate>
    <item>
      <title>e78cb445-b6ea-4a58-8523-d0c87d223202</title>
      <link>https://db.gcve.eu/sighting/e78cb445-b6ea-4a58-8523-d0c87d223202/export</link>
      <description>{"uuid": "e78cb445-b6ea-4a58-8523-d0c87d223202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "https://t.me/cibsecurity/61014", "content": "\u203c CVE-2023-26982 \u203c\n\nTrudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T18:15:32.000000Z"}</description>
      <content:encoded>{"uuid": "e78cb445-b6ea-4a58-8523-d0c87d223202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "https://t.me/cibsecurity/61014", "content": "\u203c CVE-2023-26982 \u203c\n\nTrudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T18:15:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e78cb445-b6ea-4a58-8523-d0c87d223202/export</guid>
      <pubDate>Wed, 29 Mar 2023 18:15:32 +0000</pubDate>
    </item>
    <item>
      <title>1698386c-5ad6-45bd-8285-e9ef7a160006</title>
      <link>https://db.gcve.eu/sighting/1698386c-5ad6-45bd-8285-e9ef7a160006/export</link>
      <description>{"uuid": "1698386c-5ad6-45bd-8285-e9ef7a160006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26986", "type": "seen", "source": "https://t.me/cibsecurity/61777", "content": "\u203c CVE-2023-26986 \u203c\n\nAn issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T20:27:37.000000Z"}</description>
      <content:encoded>{"uuid": "1698386c-5ad6-45bd-8285-e9ef7a160006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26986", "type": "seen", "source": "https://t.me/cibsecurity/61777", "content": "\u203c CVE-2023-26986 \u203c\n\nAn issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T20:27:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1698386c-5ad6-45bd-8285-e9ef7a160006/export</guid>
      <pubDate>Mon, 10 Apr 2023 20:27:37 +0000</pubDate>
    </item>
    <item>
      <title>5520f207-68de-482f-a477-2ffaae52271a</title>
      <link>https://db.gcve.eu/sighting/5520f207-68de-482f-a477-2ffaae52271a/export</link>
      <description>{"uuid": "5520f207-68de-482f-a477-2ffaae52271a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26980", "type": "seen", "source": "https://t.me/cibsecurity/62122", "content": "\u203c CVE-2023-26980 \u203c\n\nPAX Technology PAX A920 Pro PayDroid 8.1suffers from a Race Condition vulnerability, which allows attackers to bypass the payment software and force the OS to boot directly to Android during the boot process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T16:25:46.000000Z"}</description>
      <content:encoded>{"uuid": "5520f207-68de-482f-a477-2ffaae52271a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26980", "type": "seen", "source": "https://t.me/cibsecurity/62122", "content": "\u203c CVE-2023-26980 \u203c\n\nPAX Technology PAX A920 Pro PayDroid 8.1suffers from a Race Condition vulnerability, which allows attackers to bypass the payment software and force the OS to boot directly to Android during the boot process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T16:25:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5520f207-68de-482f-a477-2ffaae52271a/export</guid>
      <pubDate>Fri, 14 Apr 2023 16:25:46 +0000</pubDate>
    </item>
    <item>
      <title>c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84</title>
      <link>https://db.gcve.eu/sighting/c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84/export</link>
      <description>{"uuid": "c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2698", "type": "seen", "source": "https://t.me/cibsecurity/64077", "content": "\u203c CVE-2023-2698 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Lost and Found Information System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=items/manage_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228979.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-14T23:49:30.000000Z"}</description>
      <content:encoded>{"uuid": "c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2698", "type": "seen", "source": "https://t.me/cibsecurity/64077", "content": "\u203c CVE-2023-2698 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Lost and Found Information System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=items/manage_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228979.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-14T23:49:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c2d7c147-2c42-4e8b-a6f4-6dae14d3cb84/export</guid>
      <pubDate>Sun, 14 May 2023 23:49:30 +0000</pubDate>
    </item>
    <item>
      <title>926e532c-ba26-4cfb-9d11-a048facc3607</title>
      <link>https://db.gcve.eu/sighting/926e532c-ba26-4cfb-9d11-a048facc3607/export</link>
      <description>{"uuid": "926e532c-ba26-4cfb-9d11-a048facc3607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "Telegram/QAOD_72W-JjHGQvJeVwijRdf3kxEY3oAVDpAL75MAcOkDeUc", "content": "", "creation_timestamp": "2025-02-18T21:11:31.000000Z"}</description>
      <content:encoded>{"uuid": "926e532c-ba26-4cfb-9d11-a048facc3607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26982", "type": "seen", "source": "Telegram/QAOD_72W-JjHGQvJeVwijRdf3kxEY3oAVDpAL75MAcOkDeUc", "content": "", "creation_timestamp": "2025-02-18T21:11:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/926e532c-ba26-4cfb-9d11-a048facc3607/export</guid>
      <pubDate>Tue, 18 Feb 2025 21:11:31 +0000</pubDate>
    </item>
    <item>
      <title>fce8b7e8-ba2a-42b0-8d46-ca1a68ede505</title>
      <link>https://db.gcve.eu/sighting/fce8b7e8-ba2a-42b0-8d46-ca1a68ede505/export</link>
      <description>{"uuid": "fce8b7e8-ba2a-42b0-8d46-ca1a68ede505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26984", "type": "seen", "source": "Telegram/WnZR_-i7omyzJQ5LeDolm44SuD28_ij74Lz2bvZhbm8FIfMH", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}</description>
      <content:encoded>{"uuid": "fce8b7e8-ba2a-42b0-8d46-ca1a68ede505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26984", "type": "seen", "source": "Telegram/WnZR_-i7omyzJQ5LeDolm44SuD28_ij74Lz2bvZhbm8FIfMH", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fce8b7e8-ba2a-42b0-8d46-ca1a68ede505/export</guid>
      <pubDate>Tue, 18 Feb 2025 21:11:32 +0000</pubDate>
    </item>
  </channel>
</rss>
