<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 21:47:52 +0000</lastBuildDate>
    <item>
      <title>7787138b-91fd-4634-adc6-67e025aa42d9</title>
      <link>https://db.gcve.eu/sighting/7787138b-91fd-4634-adc6-67e025aa42d9/export</link>
      <description>{"uuid": "7787138b-91fd-4634-adc6-67e025aa42d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0651", "type": "seen", "source": "https://t.me/cibsecurity/57407", "content": "\u203c CVE-2023-0651 \u203c\n\nA vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-02T18:45:00.000000Z"}</description>
      <content:encoded>{"uuid": "7787138b-91fd-4634-adc6-67e025aa42d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0651", "type": "seen", "source": "https://t.me/cibsecurity/57407", "content": "\u203c CVE-2023-0651 \u203c\n\nA vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-02T18:45:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7787138b-91fd-4634-adc6-67e025aa42d9/export</guid>
      <pubDate>Thu, 02 Feb 2023 18:45:00 +0000</pubDate>
    </item>
  </channel>
</rss>
