<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T15:22:30.291362+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a0b6da46-dbe2-472b-9291-fd4bed9fad0e/export</id>
    <title>a0b6da46-dbe2-472b-9291-fd4bed9fad0e</title>
    <updated>2026-05-07T15:22:30.900196+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a0b6da46-dbe2-472b-9291-fd4bed9fad0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/16679", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-20T22:43:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a0b6da46-dbe2-472b-9291-fd4bed9fad0e/export"/>
    <published>2020-11-20T22:43:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e640f841-387a-4d48-9712-762af4512854/export</id>
    <title>e640f841-387a-4d48-9712-762af4512854</title>
    <updated>2026-05-07T15:22:30.900109+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e640f841-387a-4d48-9712-762af4512854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/17425", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:25:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e640f841-387a-4d48-9712-762af4512854/export"/>
    <published>2020-12-09T07:25:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5cae3c59-b216-41ab-8b12-bb9054ab4d66/export</id>
    <title>5cae3c59-b216-41ab-8b12-bb9054ab4d66</title>
    <updated>2026-05-07T15:22:30.900024+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5cae3c59-b216-41ab-8b12-bb9054ab4d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28841", "type": "seen", "source": "https://t.me/cibsecurity/21513", "content": "\u203c CVE-2020-28841 \u203c\n\nMyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cause a system crash via the ioctl command 0x9c402000 to \\\\.\\MyDrivers0_0_1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-03T07:34:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5cae3c59-b216-41ab-8b12-bb9054ab4d66/export"/>
    <published>2021-01-03T07:34:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/909675a5-6e88-4e49-bbd9-5695c4f6a1d1/export</id>
    <title>909675a5-6e88-4e49-bbd9-5695c4f6a1d1</title>
    <updated>2026-05-07T15:22:30.899939+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "909675a5-6e88-4e49-bbd9-5695c4f6a1d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28846", "type": "seen", "source": "https://t.me/cibsecurity/27440", "content": "\u203c CVE-2020-28846 \u203c\n\nCross Site Request Forgery (CSRF) vulnerability exists in SeaCMS 10.7 in admin_manager.php, which could let a malicious user add an admin account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-17T20:16:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/909675a5-6e88-4e49-bbd9-5695c4f6a1d1/export"/>
    <published>2021-08-17T20:16:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/34ce8d1d-dd06-4281-b63a-eb40fe63eb08/export</id>
    <title>34ce8d1d-dd06-4281-b63a-eb40fe63eb08</title>
    <updated>2026-05-07T15:22:30.899854+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "34ce8d1d-dd06-4281-b63a-eb40fe63eb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28847", "type": "seen", "source": "https://t.me/cibsecurity/40173", "content": "\u203c CVE-2020-28847 \u203c\n\nCross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T20:28:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/34ce8d1d-dd06-4281-b63a-eb40fe63eb08/export"/>
    <published>2022-04-05T20:28:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8d0023c6-c535-4088-8037-b4ca0df83600/export</id>
    <title>8d0023c6-c535-4088-8037-b4ca0df83600</title>
    <updated>2026-05-07T15:22:30.899767+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8d0023c6-c535-4088-8037-b4ca0df83600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7921", "content": "#exploit\n1. CVE-2020-2546, CVE-2020-2915,\nCVE-2020-2801, CVE-2020-2798,\nCVE-2020-2883, CVE-2020-2884,\nCVE-2020-2950:\nWebLogic T3 payload exploit PoC python3\nhttps://github.com/hktalent/CVE_2020_2546\n\n2. Tips, Tricks, and Scripts for Linux Post Exploitation\nhttps://github.com/regorsec/Linux-Post-Exploitation\n\n3. CVE-2023-23488:\nUnauthenticated SQL Injection - Paid Memberships Pro &amp;lt; 2.9.8 (WordPress Plugin)\nhttps://github.com/r3nt0n/CVE-2023-23488-PoC", "creation_timestamp": "2023-03-13T22:21:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8d0023c6-c535-4088-8037-b4ca0df83600/export"/>
    <published>2023-03-13T22:21:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0052c38a-9b19-466b-a980-4b5a7a93926a/export</id>
    <title>0052c38a-9b19-466b-a980-4b5a7a93926a</title>
    <updated>2026-05-07T15:22:30.899648+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0052c38a-9b19-466b-a980-4b5a7a93926a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "published-proof-of-concept", "source": "Telegram/5T9p9Zashh8_t2QaMEcrWCxGmV69ND__6VmH0ET2CJ3Gp-A", "content": "", "creation_timestamp": "2023-03-14T09:24:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0052c38a-9b19-466b-a980-4b5a7a93926a/export"/>
    <published>2023-03-14T09:24:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export</id>
    <title>c6f35218-bf7c-4cbc-847a-8395aab03dec</title>
    <updated>2026-05-07T15:22:30.898306+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c6f35218-bf7c-4cbc-847a-8395aab03dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28849", "type": "seen", "source": "https://t.me/cibsecurity/68354", "content": "\u203c CVE-2020-28849 \u203c\n\nCross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export"/>
    <published>2023-08-11T18:16:57+00:00</published>
  </entry>
</feed>
