<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T05:40:49.028424+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/526b2540-e2ee-4072-9f15-70bcda7561f6/export</id>
    <title>526b2540-e2ee-4072-9f15-70bcda7561f6</title>
    <updated>2026-05-04T05:40:49.376125+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "526b2540-e2ee-4072-9f15-70bcda7561f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1415", "type": "seen", "source": "https://t.me/cibsecurity/60071", "content": "\u203c CVE-2023-1415 \u203c\n\nA vulnerability was found in Simple Art Gallery 1.0. It has been declared as critical. This vulnerability affects the function sliderPicSubmit of the file adminHome.php. The manipulation leads to unrestricted upload. The attack can be initiated remotely. VDB-223126 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-15T19:55:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/526b2540-e2ee-4072-9f15-70bcda7561f6/export"/>
    <published>2023-03-15T19:55:35+00:00</published>
  </entry>
</feed>
