<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 14 May 2026 03:45:43 +0000</lastBuildDate>
    <item>
      <title>000a312e-b1e0-4f66-b16c-cd62ad31bd94</title>
      <link>https://db.gcve.eu/sighting/000a312e-b1e0-4f66-b16c-cd62ad31bd94/export</link>
      <description>{"uuid": "000a312e-b1e0-4f66-b16c-cd62ad31bd94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/ctinow/181902", "content": "https://ift.tt/ayxbDGP\nCVE-2023-46350", "creation_timestamp": "2024-02-09T09:21:43.000000Z"}</description>
      <content:encoded>{"uuid": "000a312e-b1e0-4f66-b16c-cd62ad31bd94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/ctinow/181902", "content": "https://ift.tt/ayxbDGP\nCVE-2023-46350", "creation_timestamp": "2024-02-09T09:21:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/000a312e-b1e0-4f66-b16c-cd62ad31bd94/export</guid>
      <pubDate>Fri, 09 Feb 2024 09:21:43 +0000</pubDate>
    </item>
    <item>
      <title>6f2c730e-6362-4d9b-b9c4-e3c74c9150d2</title>
      <link>https://db.gcve.eu/sighting/6f2c730e-6362-4d9b-b9c4-e3c74c9150d2/export</link>
      <description>{"uuid": "6f2c730e-6362-4d9b-b9c4-e3c74c9150d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/ctinow/198457", "content": "https://ift.tt/HFNW8su\nCVE-2023-46350 | Innovadeluxe Manufacturer or Supplier Alphabetical Search Module getCornersLink sql injection", "creation_timestamp": "2024-03-02T19:46:43.000000Z"}</description>
      <content:encoded>{"uuid": "6f2c730e-6362-4d9b-b9c4-e3c74c9150d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/ctinow/198457", "content": "https://ift.tt/HFNW8su\nCVE-2023-46350 | Innovadeluxe Manufacturer or Supplier Alphabetical Search Module getCornersLink sql injection", "creation_timestamp": "2024-03-02T19:46:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6f2c730e-6362-4d9b-b9c4-e3c74c9150d2/export</guid>
      <pubDate>Sat, 02 Mar 2024 19:46:43 +0000</pubDate>
    </item>
    <item>
      <title>de4e18ea-f814-4bf0-80d6-5262fbe1b03d</title>
      <link>https://db.gcve.eu/sighting/de4e18ea-f814-4bf0-80d6-5262fbe1b03d/export</link>
      <description>{"uuid": "de4e18ea-f814-4bf0-80d6-5262fbe1b03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19070", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46350\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL injection vulnerability in InnovaDeluxe \"Manufacturer or supplier alphabetical search\" (idxrmanufacturer) module for PrestaShop versions 2.0.4 and before, allows remote attackers to escalate privileges and obtain sensitive information via the methods IdxrmanufacturerFunctions::getCornersLink, IdxrmanufacturerFunctions::getManufacturersLike and IdxrmanufacturerFunctions::getSuppliersLike.\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T20:18:50.373Z\n\ud83d\udd17 References:\n1. https://security.friendsofpresta.org/modules/2024/02/08/idxrmanufacturer.html", "creation_timestamp": "2025-06-20T20:44:13.000000Z"}</description>
      <content:encoded>{"uuid": "de4e18ea-f814-4bf0-80d6-5262fbe1b03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46350", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19070", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46350\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL injection vulnerability in InnovaDeluxe \"Manufacturer or supplier alphabetical search\" (idxrmanufacturer) module for PrestaShop versions 2.0.4 and before, allows remote attackers to escalate privileges and obtain sensitive information via the methods IdxrmanufacturerFunctions::getCornersLink, IdxrmanufacturerFunctions::getManufacturersLike and IdxrmanufacturerFunctions::getSuppliersLike.\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T20:18:50.373Z\n\ud83d\udd17 References:\n1. https://security.friendsofpresta.org/modules/2024/02/08/idxrmanufacturer.html", "creation_timestamp": "2025-06-20T20:44:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/de4e18ea-f814-4bf0-80d6-5262fbe1b03d/export</guid>
      <pubDate>Fri, 20 Jun 2025 20:44:13 +0000</pubDate>
    </item>
  </channel>
</rss>
