<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T17:23:44.499940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export</id>
    <title>c6f35218-bf7c-4cbc-847a-8395aab03dec</title>
    <updated>2026-05-07T17:23:44.870656+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c6f35218-bf7c-4cbc-847a-8395aab03dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28849", "type": "seen", "source": "https://t.me/cibsecurity/68354", "content": "\u203c CVE-2020-28849 \u203c\n\nCross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export"/>
    <published>2023-08-11T18:16:57+00:00</published>
  </entry>
</feed>
