<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 05:20:52 +0000</lastBuildDate>
    <item>
      <title>bf06d65c-837c-4aa8-a542-ccf0f5f17c65</title>
      <link>https://db.gcve.eu/sighting/bf06d65c-837c-4aa8-a542-ccf0f5f17c65/export</link>
      <description>{"uuid": "bf06d65c-837c-4aa8-a542-ccf0f5f17c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-MR56-56J8-X6R4", "type": "seen", "source": "https://t.me/arpsyndicate/3336", "content": "#ExploitObserverAlert\n\nGHSA-mr56-56j8-x6r4\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-mr56-56j8-x6r4. An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project", "creation_timestamp": "2024-01-29T10:10:07.000000Z"}</description>
      <content:encoded>{"uuid": "bf06d65c-837c-4aa8-a542-ccf0f5f17c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-MR56-56J8-X6R4", "type": "seen", "source": "https://t.me/arpsyndicate/3336", "content": "#ExploitObserverAlert\n\nGHSA-mr56-56j8-x6r4\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-mr56-56j8-x6r4. An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project", "creation_timestamp": "2024-01-29T10:10:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf06d65c-837c-4aa8-a542-ccf0f5f17c65/export</guid>
      <pubDate>Mon, 29 Jan 2024 10:10:07 +0000</pubDate>
    </item>
  </channel>
</rss>
