<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 12:51:34 +0000</lastBuildDate>
    <item>
      <title>91e66cd1-37c0-48fc-bd19-a977a6c7f395</title>
      <link>https://db.gcve.eu/sighting/91e66cd1-37c0-48fc-bd19-a977a6c7f395/export</link>
      <description>{"uuid": "91e66cd1-37c0-48fc-bd19-a977a6c7f395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22389", "type": "seen", "source": "https://t.me/cibsecurity/57184", "content": "\u203c CVE-2023-22389 \u203c\n\nSnap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior store passwords in a plaintext file when the device configuration is exported via Save/Restore\u00e2\u20ac\u201c&amp;gt;Backup Settings, which could be read by any user accessing the file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T02:42:53.000000Z"}</description>
      <content:encoded>{"uuid": "91e66cd1-37c0-48fc-bd19-a977a6c7f395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22389", "type": "seen", "source": "https://t.me/cibsecurity/57184", "content": "\u203c CVE-2023-22389 \u203c\n\nSnap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior store passwords in a plaintext file when the device configuration is exported via Save/Restore\u00e2\u20ac\u201c&amp;gt;Backup Settings, which could be read by any user accessing the file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T02:42:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/91e66cd1-37c0-48fc-bd19-a977a6c7f395/export</guid>
      <pubDate>Tue, 31 Jan 2023 02:42:53 +0000</pubDate>
    </item>
    <item>
      <title>88aa0b39-b941-40a9-a620-93ec50e54c48</title>
      <link>https://db.gcve.eu/sighting/88aa0b39-b941-40a9-a620-93ec50e54c48/export</link>
      <description>{"uuid": "88aa0b39-b941-40a9-a620-93ec50e54c48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22380", "type": "seen", "source": "https://t.me/cibsecurity/58416", "content": "\u203c CVE-2023-22380 \u203c\n\nA path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:18:49.000000Z"}</description>
      <content:encoded>{"uuid": "88aa0b39-b941-40a9-a620-93ec50e54c48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22380", "type": "seen", "source": "https://t.me/cibsecurity/58416", "content": "\u203c CVE-2023-22380 \u203c\n\nA path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:18:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/88aa0b39-b941-40a9-a620-93ec50e54c48/export</guid>
      <pubDate>Fri, 17 Feb 2023 00:18:49 +0000</pubDate>
    </item>
    <item>
      <title>134083aa-d440-40fd-9c6a-52af0c6496d2</title>
      <link>https://db.gcve.eu/sighting/134083aa-d440-40fd-9c6a-52af0c6496d2/export</link>
      <description>{"uuid": "134083aa-d440-40fd-9c6a-52af0c6496d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22381", "type": "seen", "source": "https://t.me/cibsecurity/59347", "content": "\u203c CVE-2023-22381 \u203c\n\nA code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-03T00:44:37.000000Z"}</description>
      <content:encoded>{"uuid": "134083aa-d440-40fd-9c6a-52af0c6496d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22381", "type": "seen", "source": "https://t.me/cibsecurity/59347", "content": "\u203c CVE-2023-22381 \u203c\n\nA code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-03T00:44:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/134083aa-d440-40fd-9c6a-52af0c6496d2/export</guid>
      <pubDate>Fri, 03 Mar 2023 00:44:37 +0000</pubDate>
    </item>
    <item>
      <title>a964af09-4c87-4d7f-881e-f7be44a54237</title>
      <link>https://db.gcve.eu/sighting/a964af09-4c87-4d7f-881e-f7be44a54237/export</link>
      <description>{"uuid": "a964af09-4c87-4d7f-881e-f7be44a54237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22386", "type": "seen", "source": "https://t.me/cibsecurity/65928", "content": "\u203c CVE-2023-22386 \u203c\n\nMemory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:20.000000Z"}</description>
      <content:encoded>{"uuid": "a964af09-4c87-4d7f-881e-f7be44a54237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22386", "type": "seen", "source": "https://t.me/cibsecurity/65928", "content": "\u203c CVE-2023-22386 \u203c\n\nMemory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a964af09-4c87-4d7f-881e-f7be44a54237/export</guid>
      <pubDate>Tue, 04 Jul 2023 12:28:20 +0000</pubDate>
    </item>
    <item>
      <title>69016774-d446-4cd4-a3af-4ab0052f18d1</title>
      <link>https://db.gcve.eu/sighting/69016774-d446-4cd4-a3af-4ab0052f18d1/export</link>
      <description>{"uuid": "69016774-d446-4cd4-a3af-4ab0052f18d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22384", "type": "seen", "source": "https://t.me/cibsecurity/71468", "content": "\u203c CVE-2023-22384 \u203c\n\nMemory Corruption in VR Service while sending data using Fast Message Queue (FMQ).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:07.000000Z"}</description>
      <content:encoded>{"uuid": "69016774-d446-4cd4-a3af-4ab0052f18d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22384", "type": "seen", "source": "https://t.me/cibsecurity/71468", "content": "\u203c CVE-2023-22384 \u203c\n\nMemory Corruption in VR Service while sending data using Fast Message Queue (FMQ).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/69016774-d446-4cd4-a3af-4ab0052f18d1/export</guid>
      <pubDate>Tue, 03 Oct 2023 12:41:07 +0000</pubDate>
    </item>
    <item>
      <title>ef2fbd46-1075-479f-bca1-f91bc5ce3de2</title>
      <link>https://db.gcve.eu/sighting/ef2fbd46-1075-479f-bca1-f91bc5ce3de2/export</link>
      <description>{"uuid": "ef2fbd46-1075-479f-bca1-f91bc5ce3de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22382", "type": "seen", "source": "https://t.me/cibsecurity/71481", "content": "\u203c CVE-2023-22382 \u203c\n\nWeak configuration in Automotive while VM is processing a listener request from TEE.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:23.000000Z"}</description>
      <content:encoded>{"uuid": "ef2fbd46-1075-479f-bca1-f91bc5ce3de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22382", "type": "seen", "source": "https://t.me/cibsecurity/71481", "content": "\u203c CVE-2023-22382 \u203c\n\nWeak configuration in Automotive while VM is processing a listener request from TEE.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ef2fbd46-1075-479f-bca1-f91bc5ce3de2/export</guid>
      <pubDate>Tue, 03 Oct 2023 12:41:23 +0000</pubDate>
    </item>
    <item>
      <title>056b90a3-7dce-468c-bd87-7115797f9bc6</title>
      <link>https://db.gcve.eu/sighting/056b90a3-7dce-468c-bd87-7115797f9bc6/export</link>
      <description>{"uuid": "056b90a3-7dce-468c-bd87-7115797f9bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22383", "type": "seen", "source": "https://t.me/ctinow/158842", "content": "https://ift.tt/0YzKQgD\nCVE-2023-22383 | Qualcomm 855 Mobile Platform Camera memory corruption", "creation_timestamp": "2023-12-23T15:21:59.000000Z"}</description>
      <content:encoded>{"uuid": "056b90a3-7dce-468c-bd87-7115797f9bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22383", "type": "seen", "source": "https://t.me/ctinow/158842", "content": "https://ift.tt/0YzKQgD\nCVE-2023-22383 | Qualcomm 855 Mobile Platform Camera memory corruption", "creation_timestamp": "2023-12-23T15:21:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/056b90a3-7dce-468c-bd87-7115797f9bc6/export</guid>
      <pubDate>Sat, 23 Dec 2023 15:21:59 +0000</pubDate>
    </item>
    <item>
      <title>8d52b986-9072-48c4-8842-a5098d00fa46</title>
      <link>https://db.gcve.eu/sighting/8d52b986-9072-48c4-8842-a5098d00fa46/export</link>
      <description>{"uuid": "8d52b986-9072-48c4-8842-a5098d00fa46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2238", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulo54wyr23", "content": "", "creation_timestamp": "2025-02-11T02:16:05.319258Z"}</description>
      <content:encoded>{"uuid": "8d52b986-9072-48c4-8842-a5098d00fa46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2238", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulo54wyr23", "content": "", "creation_timestamp": "2025-02-11T02:16:05.319258Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8d52b986-9072-48c4-8842-a5098d00fa46/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:05 +0000</pubDate>
    </item>
  </channel>
</rss>
