<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T15:28:11.419608+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ce89d041-726f-458f-b054-3ee4f15e0b8d/export</id>
    <title>ce89d041-726f-458f-b054-3ee4f15e0b8d</title>
    <updated>2026-04-30T15:28:11.776106+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ce89d041-726f-458f-b054-3ee4f15e0b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-6777", "type": "seen", "source": "https://t.me/cibsecurity/22168", "content": "\u203c CVE-2020-6777 \u203c\n\nA vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ce89d041-726f-458f-b054-3ee4f15e0b8d/export"/>
    <published>2021-01-14T18:49:52+00:00</published>
  </entry>
</feed>
