<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T20:43:02.342107+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46/export</id>
    <title>15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46</title>
    <updated>2026-04-30T20:43:02.736251+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/16470", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T22:39:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46/export"/>
    <published>2020-11-17T22:39:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9/export</id>
    <title>4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9</title>
    <updated>2026-04-30T20:43:02.735068+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/17354", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T04:25:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9/export"/>
    <published>2020-12-09T04:25:17+00:00</published>
  </entry>
</feed>
