<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 00:02:26 +0000</lastBuildDate>
    <item>
      <title>4e600f0f-a469-40eb-b4da-5937a1bb80d8</title>
      <link>https://db.gcve.eu/sighting/4e600f0f-a469-40eb-b4da-5937a1bb80d8/export</link>
      <description>{"uuid": "4e600f0f-a469-40eb-b4da-5937a1bb80d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-R793-4Q47-GMJ4", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3144", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-r793-4q47-gmj4\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability was found in Itechscripts School Management Software 2.75. It has been classified as critical. This affects an unknown part of the file /notice-edit.php. The manipulation of the argument aid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-01-26T18:30:32Z\n\ud83d\udccf Modified: 2025-01-26T18:30:32Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2017-20196\n2. https://vuldb.com/?ctiid.95307\n3. https://vuldb.com/?id.95307\n4. https://www.exploit-db.com/exploits/41034", "creation_timestamp": "2025-01-26T19:07:25.000000Z"}</description>
      <content:encoded>{"uuid": "4e600f0f-a469-40eb-b4da-5937a1bb80d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-R793-4Q47-GMJ4", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3144", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-r793-4q47-gmj4\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability was found in Itechscripts School Management Software 2.75. It has been classified as critical. This affects an unknown part of the file /notice-edit.php. The manipulation of the argument aid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-01-26T18:30:32Z\n\ud83d\udccf Modified: 2025-01-26T18:30:32Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2017-20196\n2. https://vuldb.com/?ctiid.95307\n3. https://vuldb.com/?id.95307\n4. https://www.exploit-db.com/exploits/41034", "creation_timestamp": "2025-01-26T19:07:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4e600f0f-a469-40eb-b4da-5937a1bb80d8/export</guid>
      <pubDate>Sun, 26 Jan 2025 19:07:25 +0000</pubDate>
    </item>
  </channel>
</rss>
