<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:19:26 +0000</lastBuildDate>
    <item>
      <title>9a1fbcc3-3b7a-4001-8b99-029caba2273e</title>
      <link>https://db.gcve.eu/sighting/9a1fbcc3-3b7a-4001-8b99-029caba2273e/export</link>
      <description>{"uuid": "9a1fbcc3-3b7a-4001-8b99-029caba2273e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33919", "type": "seen", "source": "https://t.me/cibsecurity/65153", "content": "\u203c CVE-2023-33919 \u203c\n\nA vulnerability has been identified in CP-8031 MASTER MODULE (All versions &amp;lt; CPCI85 V05), CP-8050 MASTER MODULE (All versions &amp;lt; CPCI85 V05). The web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-13T12:33:17.000000Z"}</description>
      <content:encoded>{"uuid": "9a1fbcc3-3b7a-4001-8b99-029caba2273e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33919", "type": "seen", "source": "https://t.me/cibsecurity/65153", "content": "\u203c CVE-2023-33919 \u203c\n\nA vulnerability has been identified in CP-8031 MASTER MODULE (All versions &amp;lt; CPCI85 V05), CP-8050 MASTER MODULE (All versions &amp;lt; CPCI85 V05). The web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-13T12:33:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9a1fbcc3-3b7a-4001-8b99-029caba2273e/export</guid>
      <pubDate>Tue, 13 Jun 2023 12:33:17 +0000</pubDate>
    </item>
    <item>
      <title>cbc05172-03b2-4dd7-a1dd-1ad1ee78adeb</title>
      <link>https://db.gcve.eu/sighting/cbc05172-03b2-4dd7-a1dd-1ad1ee78adeb/export</link>
      <description>{"uuid": "cbc05172-03b2-4dd7-a1dd-1ad1ee78adeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33913", "type": "seen", "source": "https://t.me/cibsecurity/67841", "content": "\u203c CVE-2023-33913 \u203c\n\nIn DRM/oemcrypto, there is a possible out of bounds write due to an incorrect calculation of buffer size.This could lead to remote escalation of privilege with System execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T07:13:02.000000Z"}</description>
      <content:encoded>{"uuid": "cbc05172-03b2-4dd7-a1dd-1ad1ee78adeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33913", "type": "seen", "source": "https://t.me/cibsecurity/67841", "content": "\u203c CVE-2023-33913 \u203c\n\nIn DRM/oemcrypto, there is a possible out of bounds write due to an incorrect calculation of buffer size.This could lead to remote escalation of privilege with System execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T07:13:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cbc05172-03b2-4dd7-a1dd-1ad1ee78adeb/export</guid>
      <pubDate>Mon, 07 Aug 2023 07:13:02 +0000</pubDate>
    </item>
    <item>
      <title>40679fd0-f4ec-46a9-b7f3-f6dac103e37b</title>
      <link>https://db.gcve.eu/sighting/40679fd0-f4ec-46a9-b7f3-f6dac103e37b/export</link>
      <description>{"uuid": "40679fd0-f4ec-46a9-b7f3-f6dac103e37b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33914", "type": "seen", "source": "https://t.me/cibsecurity/69731", "content": "\u203c CVE-2023-33914 \u203c\n\nIn NIA0 algorithm in Security Mode Command, there is a possible missing verification incorrect input. This could lead to remote information disclosure no additional execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T07:16:18.000000Z"}</description>
      <content:encoded>{"uuid": "40679fd0-f4ec-46a9-b7f3-f6dac103e37b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33914", "type": "seen", "source": "https://t.me/cibsecurity/69731", "content": "\u203c CVE-2023-33914 \u203c\n\nIn NIA0 algorithm in Security Mode Command, there is a possible missing verification incorrect input. This could lead to remote information disclosure no additional execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T07:16:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/40679fd0-f4ec-46a9-b7f3-f6dac103e37b/export</guid>
      <pubDate>Mon, 04 Sep 2023 07:16:18 +0000</pubDate>
    </item>
    <item>
      <title>6e181967-37a5-4abd-9804-70b20c89b7f6</title>
      <link>https://db.gcve.eu/sighting/6e181967-37a5-4abd-9804-70b20c89b7f6/export</link>
      <description>{"uuid": "6e181967-37a5-4abd-9804-70b20c89b7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33915", "type": "seen", "source": "https://t.me/cibsecurity/69738", "content": "\u203c CVE-2023-33915 \u203c\n\nIn LTE protocol stack, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T07:22:01.000000Z"}</description>
      <content:encoded>{"uuid": "6e181967-37a5-4abd-9804-70b20c89b7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33915", "type": "seen", "source": "https://t.me/cibsecurity/69738", "content": "\u203c CVE-2023-33915 \u203c\n\nIn LTE protocol stack, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T07:22:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6e181967-37a5-4abd-9804-70b20c89b7f6/export</guid>
      <pubDate>Mon, 04 Sep 2023 07:22:01 +0000</pubDate>
    </item>
  </channel>
</rss>
