<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/rss/recent/cvelistv5/10</id>
  <title>Most recent entries from cvelistv5</title>
  <updated>2026-03-11T13:54:10.171581+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-3178</id>
    <title>cve-2026-3178</title>
    <updated>2026-03-11T11:09:10.516000+00:00</updated>
    <content>Name Directory &lt;= 1.32.1 - Unauthenticated Stored Cross-Site Scripting via 'name_directory_name'</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-3178"/>
    <published>2026-03-11T11:09:10.516000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-3943</id>
    <title>cve-2026-3943</title>
    <updated>2026-03-11T12:32:07.964000+00:00</updated>
    <content>H3C ACG1000-AK230 aaa_portal_auth_local_submit command injection</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-3943"/>
    <published>2026-03-11T12:32:07.964000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-3944</id>
    <title>cve-2026-3944</title>
    <updated>2026-03-11T12:32:10.799000+00:00</updated>
    <content>itsourcecode University Management System att_add.php sql injection</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-3944"/>
    <published>2026-03-11T12:32:10.799000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-3904</id>
    <title>cve-2026-3904</title>
    <updated>2026-03-11T13:19:09.741000+00:00</updated>
    <content/>
    <link href="https://db.gcve.eu/vuln/cve-2026-3904"/>
    <published>2026-03-11T13:19:09.741000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-3496</id>
    <title>cve-2026-3496</title>
    <updated>2026-03-11T13:24:34.677000+00:00</updated>
    <content>JetBooking &lt;= 4.0.3 - Unauthenticated SQL Injection via 'check_in_date' Parameter</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-3496"/>
    <published>2026-03-11T13:24:34.677000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-32059</id>
    <title>cve-2026-32059</title>
    <updated>2026-03-11T13:32:32.449000+00:00</updated>
    <content>OpenClaw 2026.2.22-2 &lt; 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-32059"/>
    <published>2026-03-11T13:32:32.449000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-32060</id>
    <title>cve-2026-32060</title>
    <updated>2026-03-11T13:32:33.790000+00:00</updated>
    <content>OpenClaw &lt; 2026.2.14 - Path Traversal in apply_patch via Crafted Paths</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-32060"/>
    <published>2026-03-11T13:32:33.790000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-32061</id>
    <title>cve-2026-32061</title>
    <updated>2026-03-11T13:32:34.842000+00:00</updated>
    <content>OpenClaw &lt; 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-32061"/>
    <published>2026-03-11T13:32:34.842000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-32062</id>
    <title>cve-2026-32062</title>
    <updated>2026-03-11T13:32:35.845000+00:00</updated>
    <content>OpenClaw 2026.2.21-2 &lt; 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-32062"/>
    <published>2026-03-11T13:32:35.845000+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/cve-2026-32063</id>
    <title>cve-2026-32063</title>
    <updated>2026-03-11T13:32:36.727000+00:00</updated>
    <content>OpenClaw 2026.2.19-2 &lt; 2026.2.21 - Command Injection via Newline in systemd Unit Generation</content>
    <link href="https://db.gcve.eu/vuln/cve-2026-32063"/>
    <published>2026-03-11T13:32:36.727000+00:00</published>
  </entry>
</feed>
