<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 15:58:26 +0000</lastBuildDate>
    <item>
      <title>c6b70e80-16fb-44ec-b8a6-badfda2d2144</title>
      <link>https://vulnerability.circl.lu/sighting/c6b70e80-16fb-44ec-b8a6-badfda2d2144/export</link>
      <description>{"uuid": "c6b70e80-16fb-44ec-b8a6-badfda2d2144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1030", "type": "seen", "source": "https://t.me/cibsecurity/58891", "content": "\u203c CVE-2023-1030 \u203c\n\nA vulnerability has been found in SourceCodester Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221755.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-24T22:19:25.000000Z"}</description>
      <content:encoded>{"uuid": "c6b70e80-16fb-44ec-b8a6-badfda2d2144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1030", "type": "seen", "source": "https://t.me/cibsecurity/58891", "content": "\u203c CVE-2023-1030 \u203c\n\nA vulnerability has been found in SourceCodester Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221755.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-24T22:19:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c6b70e80-16fb-44ec-b8a6-badfda2d2144/export</guid>
      <pubDate>Fri, 24 Feb 2023 22:19:25 +0000</pubDate>
    </item>
    <item>
      <title>09df77a4-67f0-4235-ace1-cf4bee9e8132</title>
      <link>https://vulnerability.circl.lu/sighting/09df77a4-67f0-4235-ace1-cf4bee9e8132/export</link>
      <description>{"uuid": "09df77a4-67f0-4235-ace1-cf4bee9e8132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1030", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-1030\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2023-02-24T19:36:54.136Z\n\ud83d\udccf Modified: 2025-04-03T08:28:48.240Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.221755\n2. https://vuldb.com/?ctiid.221755\n3. https://vuldb.com/?submit.94112\n4. https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected", "creation_timestamp": "2025-04-03T08:34:25.000000Z"}</description>
      <content:encoded>{"uuid": "09df77a4-67f0-4235-ace1-cf4bee9e8132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1030", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-1030\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2023-02-24T19:36:54.136Z\n\ud83d\udccf Modified: 2025-04-03T08:28:48.240Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.221755\n2. https://vuldb.com/?ctiid.221755\n3. https://vuldb.com/?submit.94112\n4. https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected", "creation_timestamp": "2025-04-03T08:34:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/09df77a4-67f0-4235-ace1-cf4bee9e8132/export</guid>
      <pubDate>Thu, 03 Apr 2025 08:34:25 +0000</pubDate>
    </item>
  </channel>
</rss>
