<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 02:25:40 +0000</lastBuildDate>
    <item>
      <title>ecf9340d-e74a-4b62-96f2-348aefc2b348</title>
      <link>https://db.gcve.eu/sighting/ecf9340d-e74a-4b62-96f2-348aefc2b348/export</link>
      <description>{"uuid": "ecf9340d-e74a-4b62-96f2-348aefc2b348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46563", "type": "seen", "source": "https://t.me/cibsecurity/72885", "content": "\u203c CVE-2023-46563 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpQoS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:35.000000Z"}</description>
      <content:encoded>{"uuid": "ecf9340d-e74a-4b62-96f2-348aefc2b348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46563", "type": "seen", "source": "https://t.me/cibsecurity/72885", "content": "\u203c CVE-2023-46563 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpQoS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ecf9340d-e74a-4b62-96f2-348aefc2b348/export</guid>
      <pubDate>Wed, 25 Oct 2023 22:52:35 +0000</pubDate>
    </item>
    <item>
      <title>5eeaa0d6-77b0-469b-97c6-32fb8e12407a</title>
      <link>https://db.gcve.eu/sighting/5eeaa0d6-77b0-469b-97c6-32fb8e12407a/export</link>
      <description>{"uuid": "5eeaa0d6-77b0-469b-97c6-32fb8e12407a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46562", "type": "seen", "source": "https://t.me/cibsecurity/72902", "content": "\u203c CVE-2023-46562 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDosCfg.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:58.000000Z"}</description>
      <content:encoded>{"uuid": "5eeaa0d6-77b0-469b-97c6-32fb8e12407a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46562", "type": "seen", "source": "https://t.me/cibsecurity/72902", "content": "\u203c CVE-2023-46562 \u203c\n\nTOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDosCfg.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5eeaa0d6-77b0-469b-97c6-32fb8e12407a/export</guid>
      <pubDate>Wed, 25 Oct 2023 22:52:58 +0000</pubDate>
    </item>
    <item>
      <title>f5bf5980-0947-40d8-bf46-4883cf03613a</title>
      <link>https://db.gcve.eu/sighting/f5bf5980-0947-40d8-bf46-4883cf03613a/export</link>
      <description>{"uuid": "f5bf5980-0947-40d8-bf46-4883cf03613a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46569", "type": "seen", "source": "https://t.me/cibsecurity/73105", "content": "\u203c CVE-2023-46569 \u203c\n\nAn out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T07:22:30.000000Z"}</description>
      <content:encoded>{"uuid": "f5bf5980-0947-40d8-bf46-4883cf03613a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46569", "type": "seen", "source": "https://t.me/cibsecurity/73105", "content": "\u203c CVE-2023-46569 \u203c\n\nAn out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T07:22:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f5bf5980-0947-40d8-bf46-4883cf03613a/export</guid>
      <pubDate>Sat, 28 Oct 2023 07:22:30 +0000</pubDate>
    </item>
    <item>
      <title>dea6801a-ad16-4caa-89cd-cb654a72d7dc</title>
      <link>https://db.gcve.eu/sighting/dea6801a-ad16-4caa-89cd-cb654a72d7dc/export</link>
      <description>{"uuid": "dea6801a-ad16-4caa-89cd-cb654a72d7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4656", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpj342t2v", "content": "", "creation_timestamp": "2025-02-11T02:16:51.430696Z"}</description>
      <content:encoded>{"uuid": "dea6801a-ad16-4caa-89cd-cb654a72d7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4656", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulpj342t2v", "content": "", "creation_timestamp": "2025-02-11T02:16:51.430696Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dea6801a-ad16-4caa-89cd-cb654a72d7dc/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:51 +0000</pubDate>
    </item>
    <item>
      <title>7946fa7a-5e84-478b-98a6-bb683d70a24a</title>
      <link>https://db.gcve.eu/sighting/7946fa7a-5e84-478b-98a6-bb683d70a24a/export</link>
      <description>{"uuid": "7946fa7a-5e84-478b-98a6-bb683d70a24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lukhzt6st32q", "content": "", "creation_timestamp": "2025-07-22T12:11:56.440401Z"}</description>
      <content:encoded>{"uuid": "7946fa7a-5e84-478b-98a6-bb683d70a24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lukhzt6st32q", "content": "", "creation_timestamp": "2025-07-22T12:11:56.440401Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7946fa7a-5e84-478b-98a6-bb683d70a24a/export</guid>
      <pubDate>Tue, 22 Jul 2025 12:11:56 +0000</pubDate>
    </item>
    <item>
      <title>2fdc5e58-4962-4ad9-98b8-94412e5b2b4e</title>
      <link>https://db.gcve.eu/sighting/2fdc5e58-4962-4ad9-98b8-94412e5b2b4e/export</link>
      <description>{"uuid": "2fdc5e58-4962-4ad9-98b8-94412e5b2b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3lukhzvro7xv2", "content": "", "creation_timestamp": "2025-07-22T12:12:39.107210Z"}</description>
      <content:encoded>{"uuid": "2fdc5e58-4962-4ad9-98b8-94412e5b2b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46565", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3lukhzvro7xv2", "content": "", "creation_timestamp": "2025-07-22T12:12:39.107210Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2fdc5e58-4962-4ad9-98b8-94412e5b2b4e/export</guid>
      <pubDate>Tue, 22 Jul 2025 12:12:39 +0000</pubDate>
    </item>
  </channel>
</rss>
