<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 02:25:38 +0000</lastBuildDate>
    <item>
      <title>b32d54fe-5b41-41cc-8dbd-c822e0fd31d7</title>
      <link>https://db.gcve.eu/sighting/b32d54fe-5b41-41cc-8dbd-c822e0fd31d7/export</link>
      <description>{"uuid": "b32d54fe-5b41-41cc-8dbd-c822e0fd31d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34486", "type": "seen", "source": "https://t.me/cibsecurity/65722", "content": "\u203c CVE-2023-34486 \u203c\n\nitsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:27.000000Z"}</description>
      <content:encoded>{"uuid": "b32d54fe-5b41-41cc-8dbd-c822e0fd31d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34486", "type": "seen", "source": "https://t.me/cibsecurity/65722", "content": "\u203c CVE-2023-34486 \u203c\n\nitsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b32d54fe-5b41-41cc-8dbd-c822e0fd31d7/export</guid>
      <pubDate>Thu, 29 Jun 2023 18:14:27 +0000</pubDate>
    </item>
    <item>
      <title>b7c186a0-aa8b-421e-a089-d3898a043145</title>
      <link>https://db.gcve.eu/sighting/b7c186a0-aa8b-421e-a089-d3898a043145/export</link>
      <description>{"uuid": "b7c186a0-aa8b-421e-a089-d3898a043145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34487", "type": "seen", "source": "https://t.me/cibsecurity/65724", "content": "\u203c CVE-2023-34487 \u203c\n\nitsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to SQL Injection. SQL injection points exist in the login password input box. This vulnerability can be exploited through time-based blind injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:29.000000Z"}</description>
      <content:encoded>{"uuid": "b7c186a0-aa8b-421e-a089-d3898a043145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34487", "type": "seen", "source": "https://t.me/cibsecurity/65724", "content": "\u203c CVE-2023-34487 \u203c\n\nitsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to SQL Injection. SQL injection points exist in the login password input box. This vulnerability can be exploited through time-based blind injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7c186a0-aa8b-421e-a089-d3898a043145/export</guid>
      <pubDate>Thu, 29 Jun 2023 18:14:29 +0000</pubDate>
    </item>
    <item>
      <title>19c8275e-441d-438e-b68a-ac205f4a3d18</title>
      <link>https://db.gcve.eu/sighting/19c8275e-441d-438e-b68a-ac205f4a3d18/export</link>
      <description>{"uuid": "19c8275e-441d-438e-b68a-ac205f4a3d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3448", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloiyx5r23", "content": "", "creation_timestamp": "2025-02-11T02:16:17.757849Z"}</description>
      <content:encoded>{"uuid": "19c8275e-441d-438e-b68a-ac205f4a3d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3448", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuloiyx5r23", "content": "", "creation_timestamp": "2025-02-11T02:16:17.757849Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/19c8275e-441d-438e-b68a-ac205f4a3d18/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:16:17 +0000</pubDate>
    </item>
  </channel>
</rss>
