<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T01:00:25.707146+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3f1d5adf-afe8-4d3a-9b44-e8e4fd28846e/export</id>
    <title>3f1d5adf-afe8-4d3a-9b44-e8e4fd28846e</title>
    <updated>2026-05-04T01:00:26.072433+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3f1d5adf-afe8-4d3a-9b44-e8e4fd28846e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23045", "type": "seen", "source": "https://t.me/cibsecurity/35903", "content": "\u203c CVE-2022-23045 \u203c\n\nPhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the \"Site title\" parameter while updating the site settings. The \"Site title\" setting is injected in several locations which triggers the XSS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-20T00:40:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3f1d5adf-afe8-4d3a-9b44-e8e4fd28846e/export"/>
    <published>2022-01-20T00:40:51+00:00</published>
  </entry>
</feed>
