<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:12:03 +0000</lastBuildDate>
    <item>
      <title>c7ab578c-67a6-4f20-94a9-09099249e388</title>
      <link>https://db.gcve.eu/sighting/c7ab578c-67a6-4f20-94a9-09099249e388/export</link>
      <description>{"uuid": "c7ab578c-67a6-4f20-94a9-09099249e388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/169162", "content": "https://ift.tt/OHA7FMo\nCVE-2023-51735", "creation_timestamp": "2024-01-17T09:26:56.000000Z"}</description>
      <content:encoded>{"uuid": "c7ab578c-67a6-4f20-94a9-09099249e388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/169162", "content": "https://ift.tt/OHA7FMo\nCVE-2023-51735", "creation_timestamp": "2024-01-17T09:26:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c7ab578c-67a6-4f20-94a9-09099249e388/export</guid>
      <pubDate>Wed, 17 Jan 2024 09:26:56 +0000</pubDate>
    </item>
    <item>
      <title>8452959f-835d-4542-a2d7-3ebe2de8b1c8</title>
      <link>https://db.gcve.eu/sighting/8452959f-835d-4542-a2d7-3ebe2de8b1c8/export</link>
      <description>{"uuid": "8452959f-835d-4542-a2d7-3ebe2de8b1c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/182571", "content": "https://ift.tt/zwaTDoY\nCVE-2023-51735 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Pre-shared key cross site scripting (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T15:17:04.000000Z"}</description>
      <content:encoded>{"uuid": "8452959f-835d-4542-a2d7-3ebe2de8b1c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/ctinow/182571", "content": "https://ift.tt/zwaTDoY\nCVE-2023-51735 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Pre-shared key cross site scripting (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T15:17:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8452959f-835d-4542-a2d7-3ebe2de8b1c8/export</guid>
      <pubDate>Sat, 10 Feb 2024 15:17:04 +0000</pubDate>
    </item>
    <item>
      <title>3554e02b-34f8-4edd-b1c2-2cce5a8962b8</title>
      <link>https://db.gcve.eu/sighting/3554e02b-34f8-4edd-b1c2-2cce5a8962b8/export</link>
      <description>{"uuid": "3554e02b-34f8-4edd-b1c2-2cce5a8962b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51735\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface.  A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.\n\n\ud83d\udccf Published: 2024-01-17T07:15:02.550Z\n\ud83d\udccf Modified: 2025-06-09T17:18:03.079Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;amp;VLCODE=CIVN-2024-0013", "creation_timestamp": "2025-06-09T18:11:32.000000Z"}</description>
      <content:encoded>{"uuid": "3554e02b-34f8-4edd-b1c2-2cce5a8962b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51735", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51735\n\ud83d\udd25 CVSS Score: 6.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N)\n\ud83d\udd39 Description: This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface.  A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.\n\n\ud83d\udccf Published: 2024-01-17T07:15:02.550Z\n\ud83d\udccf Modified: 2025-06-09T17:18:03.079Z\n\ud83d\udd17 References:\n1. https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&amp;amp;VLCODE=CIVN-2024-0013", "creation_timestamp": "2025-06-09T18:11:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3554e02b-34f8-4edd-b1c2-2cce5a8962b8/export</guid>
      <pubDate>Mon, 09 Jun 2025 18:11:32 +0000</pubDate>
    </item>
  </channel>
</rss>
