<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 12:14:38 +0000</lastBuildDate>
    <item>
      <title>e0a933b5-5dd2-4220-856f-f2dc1d36b011</title>
      <link>https://db.gcve.eu/sighting/e0a933b5-5dd2-4220-856f-f2dc1d36b011/export</link>
      <description>{"uuid": "e0a933b5-5dd2-4220-856f-f2dc1d36b011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/ctinow/162619", "content": "https://ift.tt/kFqR3bO\nCVE-2023-6338", "creation_timestamp": "2024-01-03T22:27:03.000000Z"}</description>
      <content:encoded>{"uuid": "e0a933b5-5dd2-4220-856f-f2dc1d36b011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/ctinow/162619", "content": "https://ift.tt/kFqR3bO\nCVE-2023-6338", "creation_timestamp": "2024-01-03T22:27:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e0a933b5-5dd2-4220-856f-f2dc1d36b011/export</guid>
      <pubDate>Wed, 03 Jan 2024 22:27:03 +0000</pubDate>
    </item>
    <item>
      <title>cf9eec2e-922f-431c-9271-34a858314a48</title>
      <link>https://db.gcve.eu/sighting/cf9eec2e-922f-431c-9271-34a858314a48/export</link>
      <description>{"uuid": "cf9eec2e-922f-431c-9271-34a858314a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/cibsecurity/74345", "content": "\u203c\ufe0fCVE-2023-6338\u203c\ufe0f\n\nUncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client UDC that could allow an attacker with local access to execute code with elevated privileges.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:58.000000Z"}</description>
      <content:encoded>{"uuid": "cf9eec2e-922f-431c-9271-34a858314a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/cibsecurity/74345", "content": "\u203c\ufe0fCVE-2023-6338\u203c\ufe0f\n\nUncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client UDC that could allow an attacker with local access to execute code with elevated privileges.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cf9eec2e-922f-431c-9271-34a858314a48/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:37:58 +0000</pubDate>
    </item>
    <item>
      <title>230c8bdb-7066-4890-892b-3e37322b9d51</title>
      <link>https://db.gcve.eu/sighting/230c8bdb-7066-4890-892b-3e37322b9d51/export</link>
      <description>{"uuid": "230c8bdb-7066-4890-892b-3e37322b9d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/arpsyndicate/2492", "content": "#ExploitObserverAlert\n\nCVE-2023-6338\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6338. Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.\n\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-05T16:26:26.000000Z"}</description>
      <content:encoded>{"uuid": "230c8bdb-7066-4890-892b-3e37322b9d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6338", "type": "seen", "source": "https://t.me/arpsyndicate/2492", "content": "#ExploitObserverAlert\n\nCVE-2023-6338\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6338. Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.\n\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-05T16:26:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/230c8bdb-7066-4890-892b-3e37322b9d51/export</guid>
      <pubDate>Fri, 05 Jan 2024 16:26:26 +0000</pubDate>
    </item>
  </channel>
</rss>
