<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 20:43:02 +0000</lastBuildDate>
    <item>
      <title>15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46</title>
      <link>https://db.gcve.eu/sighting/15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46/export</link>
      <description>{"uuid": "15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/16470", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T22:39:25.000000Z"}</description>
      <content:encoded>{"uuid": "15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/16470", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T22:39:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/15dfd26a-0a9b-4a16-b5b4-87ba1a7dfb46/export</guid>
      <pubDate>Tue, 17 Nov 2020 22:39:25 +0000</pubDate>
    </item>
    <item>
      <title>4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9</title>
      <link>https://db.gcve.eu/sighting/4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9/export</link>
      <description>{"uuid": "4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/17354", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T04:25:17.000000Z"}</description>
      <content:encoded>{"uuid": "4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28133", "type": "seen", "source": "https://t.me/cibsecurity/17354", "content": "\u203c CVE-2020-28133 \u203c\n\nAn issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T04:25:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4e8f1601-8bc0-49bb-9e5d-1a3c7a1b43e9/export</guid>
      <pubDate>Wed, 09 Dec 2020 04:25:17 +0000</pubDate>
    </item>
  </channel>
</rss>
