<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 21:11:35 +0000</lastBuildDate>
    <item>
      <title>f38403ab-8906-4844-8989-ed34280b58d0</title>
      <link>https://db.gcve.eu/sighting/f38403ab-8906-4844-8989-ed34280b58d0/export</link>
      <description>{"uuid": "f38403ab-8906-4844-8989-ed34280b58d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28441", "type": "seen", "source": "https://t.me/cibsecurity/60636", "content": "\u203c CVE-2023-28441 \u203c\n\nsmartCARS 3 is flight tracking software. In version 0.5.8 and prior, all persons who have failed login attempts will have their password stored in error logs. This problem doesn't occur in version 0.5.9. As a workaround, delete the affected log file, and ensure one logs in correctly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T06:37:04.000000Z"}</description>
      <content:encoded>{"uuid": "f38403ab-8906-4844-8989-ed34280b58d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28441", "type": "seen", "source": "https://t.me/cibsecurity/60636", "content": "\u203c CVE-2023-28441 \u203c\n\nsmartCARS 3 is flight tracking software. In version 0.5.8 and prior, all persons who have failed login attempts will have their password stored in error logs. This problem doesn't occur in version 0.5.9. As a workaround, delete the affected log file, and ensure one logs in correctly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T06:37:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f38403ab-8906-4844-8989-ed34280b58d0/export</guid>
      <pubDate>Fri, 24 Mar 2023 06:37:04 +0000</pubDate>
    </item>
  </channel>
</rss>
