<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T07:30:49.477985+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/818453df-eda7-4e96-8112-adf7afbbff1c/export</id>
    <title>818453df-eda7-4e96-8112-adf7afbbff1c</title>
    <updated>2026-05-04T07:30:49.834902+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "818453df-eda7-4e96-8112-adf7afbbff1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1721", "type": "seen", "source": "https://t.me/cibsecurity/65491", "content": "\u203c CVE-2023-1721 \u203c\n\nYoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-25T01:03:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/818453df-eda7-4e96-8112-adf7afbbff1c/export"/>
    <published>2023-06-25T01:03:46+00:00</published>
  </entry>
</feed>
