<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 06:55:12 +0000</lastBuildDate>
    <item>
      <title>8a4062a1-5ee1-4682-a803-3bebe8681f75</title>
      <link>https://db.gcve.eu/sighting/8a4062a1-5ee1-4682-a803-3bebe8681f75/export</link>
      <description>{"uuid": "8a4062a1-5ee1-4682-a803-3bebe8681f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2130", "type": "seen", "source": "https://t.me/cibsecurity/62311", "content": "\u203c CVE-2023-2130 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T00:28:44.000000Z"}</description>
      <content:encoded>{"uuid": "8a4062a1-5ee1-4682-a803-3bebe8681f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2130", "type": "seen", "source": "https://t.me/cibsecurity/62311", "content": "\u203c CVE-2023-2130 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T00:28:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8a4062a1-5ee1-4682-a803-3bebe8681f75/export</guid>
      <pubDate>Tue, 18 Apr 2023 00:28:44 +0000</pubDate>
    </item>
    <item>
      <title>28cbccf2-fa3f-45c9-bbe8-87a0793f5b79</title>
      <link>https://db.gcve.eu/sighting/28cbccf2-fa3f-45c9-bbe8-87a0793f5b79/export</link>
      <description>{"uuid": "28cbccf2-fa3f-45c9-bbe8-87a0793f5b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx26bp2izey2", "content": "", "creation_timestamp": "2025-08-23T04:50:33.605237Z"}</description>
      <content:encoded>{"uuid": "28cbccf2-fa3f-45c9-bbe8-87a0793f5b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx26bp2izey2", "content": "", "creation_timestamp": "2025-08-23T04:50:33.605237Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/28cbccf2-fa3f-45c9-bbe8-87a0793f5b79/export</guid>
      <pubDate>Sat, 23 Aug 2025 04:50:33 +0000</pubDate>
    </item>
    <item>
      <title>34932a88-41d4-4b28-ba97-b94ba61b6cf8</title>
      <link>https://db.gcve.eu/sighting/34932a88-41d4-4b28-ba97-b94ba61b6cf8/export</link>
      <description>{"uuid": "34932a88-41d4-4b28-ba97-b94ba61b6cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx2d6nuphu25", "content": "", "creation_timestamp": "2025-08-23T06:18:09.119630Z"}</description>
      <content:encoded>{"uuid": "34932a88-41d4-4b28-ba97-b94ba61b6cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21308", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx2d6nuphu25", "content": "", "creation_timestamp": "2025-08-23T06:18:09.119630Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/34932a88-41d4-4b28-ba97-b94ba61b6cf8/export</guid>
      <pubDate>Sat, 23 Aug 2025 06:18:09 +0000</pubDate>
    </item>
    <item>
      <title>8f908848-4852-464d-a0e4-df9d03788c5c</title>
      <link>https://db.gcve.eu/sighting/8f908848-4852-464d-a0e4-df9d03788c5c/export</link>
      <description>{"uuid": "8f908848-4852-464d-a0e4-df9d03788c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21303", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx2u7oxao7r2", "content": "", "creation_timestamp": "2025-08-23T11:23:17.490892Z"}</description>
      <content:encoded>{"uuid": "8f908848-4852-464d-a0e4-df9d03788c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21303", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx2u7oxao7r2", "content": "", "creation_timestamp": "2025-08-23T11:23:17.490892Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8f908848-4852-464d-a0e4-df9d03788c5c/export</guid>
      <pubDate>Sat, 23 Aug 2025 11:23:17 +0000</pubDate>
    </item>
    <item>
      <title>cf5e1996-0851-4fb3-870d-1b21fcdc2c73</title>
      <link>https://db.gcve.eu/sighting/cf5e1996-0851-4fb3-870d-1b21fcdc2c73/export</link>
      <description>{"uuid": "cf5e1996-0851-4fb3-870d-1b21fcdc2c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21307", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx42p7pembv2", "content": "", "creation_timestamp": "2025-08-23T22:52:09.257035Z"}</description>
      <content:encoded>{"uuid": "cf5e1996-0851-4fb3-870d-1b21fcdc2c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21307", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx42p7pembv2", "content": "", "creation_timestamp": "2025-08-23T22:52:09.257035Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cf5e1996-0851-4fb3-870d-1b21fcdc2c73/export</guid>
      <pubDate>Sat, 23 Aug 2025 22:52:09 +0000</pubDate>
    </item>
    <item>
      <title>8d2d865a-23ca-4c14-85dc-7a7d55dce29f</title>
      <link>https://db.gcve.eu/sighting/8d2d865a-23ca-4c14-85dc-7a7d55dce29f/export</link>
      <description>{"uuid": "8d2d865a-23ca-4c14-85dc-7a7d55dce29f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx6nv3oasim2", "content": "", "creation_timestamp": "2025-08-24T23:40:27.453269Z"}</description>
      <content:encoded>{"uuid": "8d2d865a-23ca-4c14-85dc-7a7d55dce29f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lx6nv3oasim2", "content": "", "creation_timestamp": "2025-08-24T23:40:27.453269Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8d2d865a-23ca-4c14-85dc-7a7d55dce29f/export</guid>
      <pubDate>Sun, 24 Aug 2025 23:40:27 +0000</pubDate>
    </item>
    <item>
      <title>22ed4357-13b6-4250-a741-306b0de8c4a3</title>
      <link>https://db.gcve.eu/sighting/22ed4357-13b6-4250-a741-306b0de8c4a3/export</link>
      <description>{"uuid": "22ed4357-13b6-4250-a741-306b0de8c4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx6oaycwac2q", "content": "", "creation_timestamp": "2025-08-24T23:46:57.210444Z"}</description>
      <content:encoded>{"uuid": "22ed4357-13b6-4250-a741-306b0de8c4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21306", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lx6oaycwac2q", "content": "", "creation_timestamp": "2025-08-24T23:46:57.210444Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/22ed4357-13b6-4250-a741-306b0de8c4a3/export</guid>
      <pubDate>Sun, 24 Aug 2025 23:46:57 +0000</pubDate>
    </item>
  </channel>
</rss>
