<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 15 May 2026 08:56:23 +0000</lastBuildDate>
    <item>
      <title>e38e44b9-8760-48a0-ac6e-1d7250cc06c5</title>
      <link>https://db.gcve.eu/sighting/e38e44b9-8760-48a0-ac6e-1d7250cc06c5/export</link>
      <description>{"uuid": "e38e44b9-8760-48a0-ac6e-1d7250cc06c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/ctinow/160720", "content": "https://ift.tt/a0eDcjG\nCVE-2023-52240", "creation_timestamp": "2023-12-29T23:26:28.000000Z"}</description>
      <content:encoded>{"uuid": "e38e44b9-8760-48a0-ac6e-1d7250cc06c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/ctinow/160720", "content": "https://ift.tt/a0eDcjG\nCVE-2023-52240", "creation_timestamp": "2023-12-29T23:26:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e38e44b9-8760-48a0-ac6e-1d7250cc06c5/export</guid>
      <pubDate>Fri, 29 Dec 2023 23:26:28 +0000</pubDate>
    </item>
    <item>
      <title>623a8ecc-1dd6-4963-81ca-5d38d548f2a1</title>
      <link>https://db.gcve.eu/sighting/623a8ecc-1dd6-4963-81ca-5d38d548f2a1/export</link>
      <description>{"uuid": "623a8ecc-1dd6-4963-81ca-5d38d548f2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/cibsecurity/74010", "content": "\u203c\ufe0fCVE-2023-52240\u203c\ufe0f\n\nThe Kantega SAML SSO OIDC Kerberos Single Signon apps before 6.20.0 for Atlassian products allow XSS if SAML POST Binding is enabled. This affects 4.4.2 through 4.14.8 before 4.14.9, 5.0.0 through 5.11.4 before 5.11.5, and 6.0.0 through 6.19.0 before 6.20.0. The full product names are Kantega SAML SSO OIDC Kerberos Single Signon for Jira Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Confluence Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Bitbucket Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Bamboo Data Center  Server Kantega SSO Enterprise, and Kantega SAML SSO OIDC Kerberos Single Signon for FeCru Server Kantega SSO Enterprise. Here, FeCru refers to the Atlassian Fisheye and Crucible products running together.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T02:18:29.000000Z"}</description>
      <content:encoded>{"uuid": "623a8ecc-1dd6-4963-81ca-5d38d548f2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/cibsecurity/74010", "content": "\u203c\ufe0fCVE-2023-52240\u203c\ufe0f\n\nThe Kantega SAML SSO OIDC Kerberos Single Signon apps before 6.20.0 for Atlassian products allow XSS if SAML POST Binding is enabled. This affects 4.4.2 through 4.14.8 before 4.14.9, 5.0.0 through 5.11.4 before 5.11.5, and 6.0.0 through 6.19.0 before 6.20.0. The full product names are Kantega SAML SSO OIDC Kerberos Single Signon for Jira Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Confluence Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Bitbucket Data Center  Server Kantega SSO Enterprise, Kantega SAML SSO OIDC Kerberos Single Signon for Bamboo Data Center  Server Kantega SSO Enterprise, and Kantega SAML SSO OIDC Kerberos Single Signon for FeCru Server Kantega SSO Enterprise. Here, FeCru refers to the Atlassian Fisheye and Crucible products running together.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T02:18:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/623a8ecc-1dd6-4963-81ca-5d38d548f2a1/export</guid>
      <pubDate>Sat, 30 Dec 2023 02:18:29 +0000</pubDate>
    </item>
    <item>
      <title>ba00fe07-84df-46cd-af2d-94ab9a5582c9</title>
      <link>https://db.gcve.eu/sighting/ba00fe07-84df-46cd-af2d-94ab9a5582c9/export</link>
      <description>{"uuid": "ba00fe07-84df-46cd-af2d-94ab9a5582c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/ctinow/170896", "content": "https://ift.tt/RwXMZj2\nCVE-2023-52240 | Kantega SAML SSO OIDC Kerberos Single Sign-on App cross site scripting", "creation_timestamp": "2024-01-21T18:16:33.000000Z"}</description>
      <content:encoded>{"uuid": "ba00fe07-84df-46cd-af2d-94ab9a5582c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52240", "type": "seen", "source": "https://t.me/ctinow/170896", "content": "https://ift.tt/RwXMZj2\nCVE-2023-52240 | Kantega SAML SSO OIDC Kerberos Single Sign-on App cross site scripting", "creation_timestamp": "2024-01-21T18:16:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ba00fe07-84df-46cd-af2d-94ab9a5582c9/export</guid>
      <pubDate>Sun, 21 Jan 2024 18:16:33 +0000</pubDate>
    </item>
  </channel>
</rss>
