<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T05:56:20.094987+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8a4062a1-5ee1-4682-a803-3bebe8681f75/export</id>
    <title>8a4062a1-5ee1-4682-a803-3bebe8681f75</title>
    <updated>2026-05-23T05:56:20.567374+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8a4062a1-5ee1-4682-a803-3bebe8681f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2130", "type": "seen", "source": "https://t.me/cibsecurity/62311", "content": "\u203c CVE-2023-2130 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T00:28:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8a4062a1-5ee1-4682-a803-3bebe8681f75/export"/>
    <published>2023-04-18T00:28:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/28cbccf2-fa3f-45c9-bbe8-87a0793f5b79/export</id>
    <title>28cbccf2-fa3f-45c9-bbe8-87a0793f5b79</title>
    <updated>2026-05-23T05:56:20.567326+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "28cbccf2-fa3f-45c9-bbe8-87a0793f5b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx26bp2izey2", "content": "", "creation_timestamp": "2025-08-23T04:50:33.605237Z"}</content>
    <link href="https://db.gcve.eu/sighting/28cbccf2-fa3f-45c9-bbe8-87a0793f5b79/export"/>
    <published>2025-08-23T04:50:33.605237+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/34932a88-41d4-4b28-ba97-b94ba61b6cf8/export</id>
    <title>34932a88-41d4-4b28-ba97-b94ba61b6cf8</title>
    <updated>2026-05-23T05:56:20.567275+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "34932a88-41d4-4b28-ba97-b94ba61b6cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx2d6nuphu25", "content": "", "creation_timestamp": "2025-08-23T06:18:09.119630Z"}</content>
    <link href="https://db.gcve.eu/sighting/34932a88-41d4-4b28-ba97-b94ba61b6cf8/export"/>
    <published>2025-08-23T06:18:09.119630+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f908848-4852-464d-a0e4-df9d03788c5c/export</id>
    <title>8f908848-4852-464d-a0e4-df9d03788c5c</title>
    <updated>2026-05-23T05:56:20.567222+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8f908848-4852-464d-a0e4-df9d03788c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21303", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx2u7oxao7r2", "content": "", "creation_timestamp": "2025-08-23T11:23:17.490892Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f908848-4852-464d-a0e4-df9d03788c5c/export"/>
    <published>2025-08-23T11:23:17.490892+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cf5e1996-0851-4fb3-870d-1b21fcdc2c73/export</id>
    <title>cf5e1996-0851-4fb3-870d-1b21fcdc2c73</title>
    <updated>2026-05-23T05:56:20.567167+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cf5e1996-0851-4fb3-870d-1b21fcdc2c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21307", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx42p7pembv2", "content": "", "creation_timestamp": "2025-08-23T22:52:09.257035Z"}</content>
    <link href="https://db.gcve.eu/sighting/cf5e1996-0851-4fb3-870d-1b21fcdc2c73/export"/>
    <published>2025-08-23T22:52:09.257035+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8d2d865a-23ca-4c14-85dc-7a7d55dce29f/export</id>
    <title>8d2d865a-23ca-4c14-85dc-7a7d55dce29f</title>
    <updated>2026-05-23T05:56:20.567075+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8d2d865a-23ca-4c14-85dc-7a7d55dce29f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx6nv3oasim2", "content": "", "creation_timestamp": "2025-08-24T23:40:27.453269Z"}</content>
    <link href="https://db.gcve.eu/sighting/8d2d865a-23ca-4c14-85dc-7a7d55dce29f/export"/>
    <published>2025-08-24T23:40:27.453269+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/22ed4357-13b6-4250-a741-306b0de8c4a3/export</id>
    <title>22ed4357-13b6-4250-a741-306b0de8c4a3</title>
    <updated>2026-05-23T05:56:20.565874+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "22ed4357-13b6-4250-a741-306b0de8c4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx6oaycwac2q", "content": "", "creation_timestamp": "2025-08-24T23:46:57.210444Z"}</content>
    <link href="https://db.gcve.eu/sighting/22ed4357-13b6-4250-a741-306b0de8c4a3/export"/>
    <published>2025-08-24T23:46:57.210444+00:00</published>
  </entry>
</feed>
