<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T20:28:55.952536+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/322b869d-5eca-4116-9ea2-8ef8c8be972c/export</id>
    <title>322b869d-5eca-4116-9ea2-8ef8c8be972c</title>
    <updated>2026-05-08T20:28:56.322074+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "322b869d-5eca-4116-9ea2-8ef8c8be972c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2773", "type": "seen", "source": "https://t.me/cibsecurity/47951", "content": "\u203c CVE-2022-2773 \u203c\n\nA vulnerability was found in SourceCodester Apartment Visitor Management System. It has been classified as problematic. This affects an unknown part of the file profile.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-206169 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T16:41:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/322b869d-5eca-4116-9ea2-8ef8c8be972c/export"/>
    <published>2022-08-11T16:41:58+00:00</published>
  </entry>
</feed>
