<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 20:07:29 +0000</lastBuildDate>
    <item>
      <title>4345d181-a773-4ae0-a9c8-f824330ba28f</title>
      <link>https://db.gcve.eu/sighting/4345d181-a773-4ae0-a9c8-f824330ba28f/export</link>
      <description>{"uuid": "4345d181-a773-4ae0-a9c8-f824330ba28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39137", "type": "seen", "source": "https://t.me/cibsecurity/69488", "content": "\u203c CVE-2023-39137 \u203c\n\nAn issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:22:59.000000Z"}</description>
      <content:encoded>{"uuid": "4345d181-a773-4ae0-a9c8-f824330ba28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39137", "type": "seen", "source": "https://t.me/cibsecurity/69488", "content": "\u203c CVE-2023-39137 \u203c\n\nAn issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:22:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4345d181-a773-4ae0-a9c8-f824330ba28f/export</guid>
      <pubDate>Thu, 31 Aug 2023 02:22:59 +0000</pubDate>
    </item>
    <item>
      <title>9d5bd655-6d6d-4fc0-ac2e-1a3fd50d5981</title>
      <link>https://db.gcve.eu/sighting/9d5bd655-6d6d-4fc0-ac2e-1a3fd50d5981/export</link>
      <description>{"uuid": "9d5bd655-6d6d-4fc0-ac2e-1a3fd50d5981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39139", "type": "seen", "source": "https://t.me/cibsecurity/69492", "content": "\u203c CVE-2023-39139 \u203c\n\nAn issue in Archive v3.3.7 allows attackers to execute a path traversal via extracting a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:23:03.000000Z"}</description>
      <content:encoded>{"uuid": "9d5bd655-6d6d-4fc0-ac2e-1a3fd50d5981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39139", "type": "seen", "source": "https://t.me/cibsecurity/69492", "content": "\u203c CVE-2023-39139 \u203c\n\nAn issue in Archive v3.3.7 allows attackers to execute a path traversal via extracting a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:23:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9d5bd655-6d6d-4fc0-ac2e-1a3fd50d5981/export</guid>
      <pubDate>Thu, 31 Aug 2023 02:23:03 +0000</pubDate>
    </item>
    <item>
      <title>b0077f69-118f-4a13-89e1-3a21a4c26d6f</title>
      <link>https://db.gcve.eu/sighting/b0077f69-118f-4a13-89e1-3a21a4c26d6f/export</link>
      <description>{"uuid": "b0077f69-118f-4a13-89e1-3a21a4c26d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39138", "type": "seen", "source": "https://t.me/cibsecurity/69493", "content": "\u203c CVE-2023-39138 \u203c\n\nAn issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:26:00.000000Z"}</description>
      <content:encoded>{"uuid": "b0077f69-118f-4a13-89e1-3a21a4c26d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39138", "type": "seen", "source": "https://t.me/cibsecurity/69493", "content": "\u203c CVE-2023-39138 \u203c\n\nAn issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:26:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b0077f69-118f-4a13-89e1-3a21a4c26d6f/export</guid>
      <pubDate>Thu, 31 Aug 2023 02:26:00 +0000</pubDate>
    </item>
    <item>
      <title>7e031d24-d527-4809-a06a-d029816d152a</title>
      <link>https://db.gcve.eu/sighting/7e031d24-d527-4809-a06a-d029816d152a/export</link>
      <description>{"uuid": "7e031d24-d527-4809-a06a-d029816d152a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39136", "type": "seen", "source": "https://t.me/cibsecurity/69494", "content": "\u203c CVE-2023-39136 \u203c\n\nAn unhandled edge case in the component _sanitizedPath of ZipArchive v2.5.4 allows attackers to cause a Denial of Service (DoS) via a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:26:00.000000Z"}</description>
      <content:encoded>{"uuid": "7e031d24-d527-4809-a06a-d029816d152a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39136", "type": "seen", "source": "https://t.me/cibsecurity/69494", "content": "\u203c CVE-2023-39136 \u203c\n\nAn unhandled edge case in the component _sanitizedPath of ZipArchive v2.5.4 allows attackers to cause a Denial of Service (DoS) via a crafted zip file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:26:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e031d24-d527-4809-a06a-d029816d152a/export</guid>
      <pubDate>Thu, 31 Aug 2023 02:26:00 +0000</pubDate>
    </item>
    <item>
      <title>598aed35-dc35-4ab1-b0f1-40b02eaef079</title>
      <link>https://db.gcve.eu/sighting/598aed35-dc35-4ab1-b0f1-40b02eaef079/export</link>
      <description>{"uuid": "598aed35-dc35-4ab1-b0f1-40b02eaef079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39135", "type": "seen", "source": "https://t.me/cibsecurity/69498", "content": "\u203c CVE-2023-39135 \u203c\n\nAn issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:29:02.000000Z"}</description>
      <content:encoded>{"uuid": "598aed35-dc35-4ab1-b0f1-40b02eaef079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39135", "type": "seen", "source": "https://t.me/cibsecurity/69498", "content": "\u203c CVE-2023-39135 \u203c\n\nAn issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T02:29:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/598aed35-dc35-4ab1-b0f1-40b02eaef079/export</guid>
      <pubDate>Thu, 31 Aug 2023 02:29:02 +0000</pubDate>
    </item>
    <item>
      <title>30c6bf21-c626-47af-b6bf-d097124ad5d2</title>
      <link>https://db.gcve.eu/sighting/30c6bf21-c626-47af-b6bf-d097124ad5d2/export</link>
      <description>{"uuid": "30c6bf21-c626-47af-b6bf-d097124ad5d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3913", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloveaq32h", "content": "", "creation_timestamp": "2025-02-11T02:16:30.734556Z"}</description>
      <content:encoded>{"uuid": "30c6bf21-c626-47af-b6bf-d097124ad5d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3913", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloveaq32h", "content": "", "creation_timestamp": "2025-02-11T02:16:30.734556Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/30c6bf21-c626-47af-b6bf-d097124ad5d2/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:30 +0000</pubDate>
    </item>
  </channel>
</rss>
