<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 21:42:52 +0000</lastBuildDate>
    <item>
      <title>51698ac4-8ecc-4993-bf87-4035550568e9</title>
      <link>https://db.gcve.eu/sighting/51698ac4-8ecc-4993-bf87-4035550568e9/export</link>
      <description>{"uuid": "51698ac4-8ecc-4993-bf87-4035550568e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30860", "type": "seen", "source": "https://t.me/cibsecurity/63455", "content": "\u203c CVE-2023-30860 \u203c\n\nWWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-08T22:37:43.000000Z"}</description>
      <content:encoded>{"uuid": "51698ac4-8ecc-4993-bf87-4035550568e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30860", "type": "seen", "source": "https://t.me/cibsecurity/63455", "content": "\u203c CVE-2023-30860 \u203c\n\nWWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-08T22:37:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/51698ac4-8ecc-4993-bf87-4035550568e9/export</guid>
      <pubDate>Mon, 08 May 2023 22:37:43 +0000</pubDate>
    </item>
  </channel>
</rss>
