<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:40:35 +0000</lastBuildDate>
    <item>
      <title>f2f67f21-412d-403f-b0ea-02c244dd4306</title>
      <link>https://db.gcve.eu/sighting/f2f67f21-412d-403f-b0ea-02c244dd4306/export</link>
      <description>{"uuid": "f2f67f21-412d-403f-b0ea-02c244dd4306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28712", "type": "seen", "source": "https://t.me/cibsecurity/60962", "content": "\u203c CVE-2023-28712 \u203c\n\nOsprey Pump Controller version 1.01 contains an unauthenticated command injection vulnerability that could allow system access with www-data permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:46:08.000000Z"}</description>
      <content:encoded>{"uuid": "f2f67f21-412d-403f-b0ea-02c244dd4306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28712", "type": "seen", "source": "https://t.me/cibsecurity/60962", "content": "\u203c CVE-2023-28712 \u203c\n\nOsprey Pump Controller version 1.01 contains an unauthenticated command injection vulnerability that could allow system access with www-data permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:46:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f2f67f21-412d-403f-b0ea-02c244dd4306/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:46:08 +0000</pubDate>
    </item>
    <item>
      <title>6cbc9b79-7982-4c20-ba16-cee0b6860e8c</title>
      <link>https://db.gcve.eu/sighting/6cbc9b79-7982-4c20-ba16-cee0b6860e8c/export</link>
      <description>{"uuid": "6cbc9b79-7982-4c20-ba16-cee0b6860e8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28710", "type": "seen", "source": "https://t.me/cibsecurity/61692", "content": "\u203c CVE-2023-28710 \u203c\n\nImproper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider.This issue affects Apache Airflow Spark Provider: before 4.0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T18:29:26.000000Z"}</description>
      <content:encoded>{"uuid": "6cbc9b79-7982-4c20-ba16-cee0b6860e8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28710", "type": "seen", "source": "https://t.me/cibsecurity/61692", "content": "\u203c CVE-2023-28710 \u203c\n\nImproper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider.This issue affects Apache Airflow Spark Provider: before 4.0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T18:29:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6cbc9b79-7982-4c20-ba16-cee0b6860e8c/export</guid>
      <pubDate>Fri, 07 Apr 2023 18:29:26 +0000</pubDate>
    </item>
    <item>
      <title>ee6ca7bc-93e7-4478-8567-895676741cad</title>
      <link>https://db.gcve.eu/sighting/ee6ca7bc-93e7-4478-8567-895676741cad/export</link>
      <description>{"uuid": "ee6ca7bc-93e7-4478-8567-895676741cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2871", "type": "seen", "source": "https://t.me/cibsecurity/64712", "content": "\u203c CVE-2023-2871 \u203c\n\nA vulnerability was found in FabulaTech USB for Remote Desktop 6.1.0.0. It has been rated as problematic. Affected by this issue is the function 0x220448/0x220420/0x22040c/0x220408 of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-229850 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:17.000000Z"}</description>
      <content:encoded>{"uuid": "ee6ca7bc-93e7-4478-8567-895676741cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2871", "type": "seen", "source": "https://t.me/cibsecurity/64712", "content": "\u203c CVE-2023-2871 \u203c\n\nA vulnerability was found in FabulaTech USB for Remote Desktop 6.1.0.0. It has been rated as problematic. Affected by this issue is the function 0x220448/0x220420/0x22040c/0x220408 of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-229850 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ee6ca7bc-93e7-4478-8567-895676741cad/export</guid>
      <pubDate>Wed, 24 May 2023 22:27:17 +0000</pubDate>
    </item>
    <item>
      <title>229334ba-5195-4d52-ab5b-a24a99fc9198</title>
      <link>https://db.gcve.eu/sighting/229334ba-5195-4d52-ab5b-a24a99fc9198/export</link>
      <description>{"uuid": "229334ba-5195-4d52-ab5b-a24a99fc9198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28711", "type": "seen", "source": "https://t.me/cibsecurity/68274", "content": "\u203c CVE-2023-28711 \u203c\n\nInsufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "229334ba-5195-4d52-ab5b-a24a99fc9198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28711", "type": "seen", "source": "https://t.me/cibsecurity/68274", "content": "\u203c CVE-2023-28711 \u203c\n\nInsufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/229334ba-5195-4d52-ab5b-a24a99fc9198/export</guid>
      <pubDate>Fri, 11 Aug 2023 07:26:27 +0000</pubDate>
    </item>
    <item>
      <title>a3015a3f-5b5a-452b-af91-660db82a320a</title>
      <link>https://db.gcve.eu/sighting/a3015a3f-5b5a-452b-af91-660db82a320a/export</link>
      <description>{"uuid": "a3015a3f-5b5a-452b-af91-660db82a320a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28714", "type": "seen", "source": "https://t.me/cibsecurity/68291", "content": "\u203c CVE-2023-28714 \u203c\n\nImproper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:29:27.000000Z"}</description>
      <content:encoded>{"uuid": "a3015a3f-5b5a-452b-af91-660db82a320a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28714", "type": "seen", "source": "https://t.me/cibsecurity/68291", "content": "\u203c CVE-2023-28714 \u203c\n\nImproper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:29:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a3015a3f-5b5a-452b-af91-660db82a320a/export</guid>
      <pubDate>Fri, 11 Aug 2023 07:29:27 +0000</pubDate>
    </item>
    <item>
      <title>5290106f-daa0-44f5-a208-76eda7a8f8ba</title>
      <link>https://db.gcve.eu/sighting/5290106f-daa0-44f5-a208-76eda7a8f8ba/export</link>
      <description>{"uuid": "5290106f-daa0-44f5-a208-76eda7a8f8ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28715", "type": "seen", "source": "https://t.me/ctinow/201221", "content": "https://ift.tt/46gVGN3\nCVE-2023-28715 | Intel oneAPI Toolkit and Component Software prior 4.3.2 denial of service (intel-sa-00956)", "creation_timestamp": "2024-03-06T11:41:14.000000Z"}</description>
      <content:encoded>{"uuid": "5290106f-daa0-44f5-a208-76eda7a8f8ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28715", "type": "seen", "source": "https://t.me/ctinow/201221", "content": "https://ift.tt/46gVGN3\nCVE-2023-28715 | Intel oneAPI Toolkit and Component Software prior 4.3.2 denial of service (intel-sa-00956)", "creation_timestamp": "2024-03-06T11:41:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5290106f-daa0-44f5-a208-76eda7a8f8ba/export</guid>
      <pubDate>Wed, 06 Mar 2024 11:41:14 +0000</pubDate>
    </item>
  </channel>
</rss>
