<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 10:13:35 +0000</lastBuildDate>
    <item>
      <title>f62a6011-990a-48d7-b5b4-34ec5c2ddbfb</title>
      <link>https://db.gcve.eu/sighting/f62a6011-990a-48d7-b5b4-34ec5c2ddbfb/export</link>
      <description>{"uuid": "f62a6011-990a-48d7-b5b4-34ec5c2ddbfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39289", "type": "seen", "source": "https://t.me/cibsecurity/69228", "content": "\u203c CVE-2023-39289 \u203c\n\nA vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect through 9.6.2208.101 could allow an unauthenticated attacker to conduct an account enumeration attack due to improper configuration. A successful exploit could allow an attacker to access system information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:24:33.000000Z"}</description>
      <content:encoded>{"uuid": "f62a6011-990a-48d7-b5b4-34ec5c2ddbfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39289", "type": "seen", "source": "https://t.me/cibsecurity/69228", "content": "\u203c CVE-2023-39289 \u203c\n\nA vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect through 9.6.2208.101 could allow an unauthenticated attacker to conduct an account enumeration attack due to improper configuration. A successful exploit could allow an attacker to access system information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:24:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f62a6011-990a-48d7-b5b4-34ec5c2ddbfb/export</guid>
      <pubDate>Sat, 26 Aug 2023 02:24:33 +0000</pubDate>
    </item>
    <item>
      <title>d904960f-4af2-47ac-bb6a-c3e1c75e32a5</title>
      <link>https://db.gcve.eu/sighting/d904960f-4af2-47ac-bb6a-c3e1c75e32a5/export</link>
      <description>{"uuid": "d904960f-4af2-47ac-bb6a-c3e1c75e32a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39287", "type": "seen", "source": "https://t.me/cibsecurity/69231", "content": "\u203c CVE-2023-39287 \u203c\n\nA vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) could allow an authenticated attacker with elevated privileges and internal network access to conduct a command argument injection due to insufficient parameter sanitization. A successful exploit could allow an attacker to access network information and to generate excessive network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:27:34.000000Z"}</description>
      <content:encoded>{"uuid": "d904960f-4af2-47ac-bb6a-c3e1c75e32a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39287", "type": "seen", "source": "https://t.me/cibsecurity/69231", "content": "\u203c CVE-2023-39287 \u203c\n\nA vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) could allow an authenticated attacker with elevated privileges and internal network access to conduct a command argument injection due to insufficient parameter sanitization. A successful exploit could allow an attacker to access network information and to generate excessive network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:27:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d904960f-4af2-47ac-bb6a-c3e1c75e32a5/export</guid>
      <pubDate>Sat, 26 Aug 2023 02:27:34 +0000</pubDate>
    </item>
    <item>
      <title>dc08058a-a07f-4f4c-a019-a5f031431d42</title>
      <link>https://db.gcve.eu/sighting/dc08058a-a07f-4f4c-a019-a5f031431d42/export</link>
      <description>{"uuid": "dc08058a-a07f-4f4c-a019-a5f031431d42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39288", "type": "seen", "source": "https://t.me/cibsecurity/69233", "content": "\u203c CVE-2023-39288 \u203c\n\nA vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect through 9.6.2304.102 could allow an authenticated attacker with elevated privileges and internal network access to conduct a command argument injection due to insufficient parameter sanitization. A successful exploit could allow an attacker to access network information and to generate excessive network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:27:36.000000Z"}</description>
      <content:encoded>{"uuid": "dc08058a-a07f-4f4c-a019-a5f031431d42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39288", "type": "seen", "source": "https://t.me/cibsecurity/69233", "content": "\u203c CVE-2023-39288 \u203c\n\nA vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect through 9.6.2304.102 could allow an authenticated attacker with elevated privileges and internal network access to conduct a command argument injection due to insufficient parameter sanitization. A successful exploit could allow an attacker to access network information and to generate excessive network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T02:27:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dc08058a-a07f-4f4c-a019-a5f031431d42/export</guid>
      <pubDate>Sat, 26 Aug 2023 02:27:36 +0000</pubDate>
    </item>
    <item>
      <title>746247d1-8130-45d9-aa13-62e9f29cfb92</title>
      <link>https://db.gcve.eu/sighting/746247d1-8130-45d9-aa13-62e9f29cfb92/export</link>
      <description>{"uuid": "746247d1-8130-45d9-aa13-62e9f29cfb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39280", "type": "seen", "source": "https://t.me/cibsecurity/72476", "content": "\u203c CVE-2023-39280 \u203c\n\nSonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the ssoStats-s.xml, ssoStats-s.wri URL endpoints leads to a firewall crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T06:18:59.000000Z"}</description>
      <content:encoded>{"uuid": "746247d1-8130-45d9-aa13-62e9f29cfb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39280", "type": "seen", "source": "https://t.me/cibsecurity/72476", "content": "\u203c CVE-2023-39280 \u203c\n\nSonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the ssoStats-s.xml, ssoStats-s.wri URL endpoints leads to a firewall crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T06:18:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/746247d1-8130-45d9-aa13-62e9f29cfb92/export</guid>
      <pubDate>Wed, 18 Oct 2023 06:18:59 +0000</pubDate>
    </item>
    <item>
      <title>0071671f-8fad-4ded-8ff4-a1fbf55b4ed6</title>
      <link>https://db.gcve.eu/sighting/0071671f-8fad-4ded-8ff4-a1fbf55b4ed6/export</link>
      <description>{"uuid": "0071671f-8fad-4ded-8ff4-a1fbf55b4ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39281", "type": "seen", "source": "https://t.me/cibsecurity/73395", "content": "\u203c CVE-2023-39281 \u203c\n\nA stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T01:22:10.000000Z"}</description>
      <content:encoded>{"uuid": "0071671f-8fad-4ded-8ff4-a1fbf55b4ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39281", "type": "seen", "source": "https://t.me/cibsecurity/73395", "content": "\u203c CVE-2023-39281 \u203c\n\nA stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T01:22:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0071671f-8fad-4ded-8ff4-a1fbf55b4ed6/export</guid>
      <pubDate>Thu, 02 Nov 2023 01:22:10 +0000</pubDate>
    </item>
    <item>
      <title>ce88c4cb-685d-4362-9a07-65302210c3c0</title>
      <link>https://db.gcve.eu/sighting/ce88c4cb-685d-4362-9a07-65302210c3c0/export</link>
      <description>{"uuid": "ce88c4cb-685d-4362-9a07-65302210c3c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39284", "type": "seen", "source": "https://t.me/cibsecurity/73483", "content": "\u203c CVE-2023-39284 \u203c\n\nAn issue was discovered in IhisiServicesSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There are arbitrary calls to SetVariable with unsanitized arguments in the SMI handler.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T23:22:47.000000Z"}</description>
      <content:encoded>{"uuid": "ce88c4cb-685d-4362-9a07-65302210c3c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39284", "type": "seen", "source": "https://t.me/cibsecurity/73483", "content": "\u203c CVE-2023-39284 \u203c\n\nAn issue was discovered in IhisiServicesSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There are arbitrary calls to SetVariable with unsanitized arguments in the SMI handler.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T23:22:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ce88c4cb-685d-4362-9a07-65302210c3c0/export</guid>
      <pubDate>Thu, 02 Nov 2023 23:22:47 +0000</pubDate>
    </item>
    <item>
      <title>5cdf563c-eb16-4b58-a1b9-1dd1f65ac4d7</title>
      <link>https://db.gcve.eu/sighting/5cdf563c-eb16-4b58-a1b9-1dd1f65ac4d7/export</link>
      <description>{"uuid": "5cdf563c-eb16-4b58-a1b9-1dd1f65ac4d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3928", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulp2xf5l2h", "content": "", "creation_timestamp": "2025-02-11T02:16:36.562357Z"}</description>
      <content:encoded>{"uuid": "5cdf563c-eb16-4b58-a1b9-1dd1f65ac4d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3928", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulp2xf5l2h", "content": "", "creation_timestamp": "2025-02-11T02:16:36.562357Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5cdf563c-eb16-4b58-a1b9-1dd1f65ac4d7/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:36 +0000</pubDate>
    </item>
  </channel>
</rss>
