<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T23:22:41.777464+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/76be98b3-a51f-4092-9bc8-b169e7fa79e3/export</id>
    <title>76be98b3-a51f-4092-9bc8-b169e7fa79e3</title>
    <updated>2026-04-30T23:22:42.140501+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "76be98b3-a51f-4092-9bc8-b169e7fa79e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "seen", "source": "https://t.me/cibsecurity/22786", "content": "\u203c CVE-2020-13569 \u203c\n\nA cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T16:38:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/76be98b3-a51f-4092-9bc8-b169e7fa79e3/export"/>
    <published>2021-01-28T16:38:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b410ed6a-06bc-476d-8bcd-094d8237c9dc/export</id>
    <title>b410ed6a-06bc-476d-8bcd-094d8237c9dc</title>
    <updated>2026-04-30T23:22:42.139250+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b410ed6a-06bc-476d-8bcd-094d8237c9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2599", "content": "Multiple vulnerabilities in phpGACL class (CVE-2020-13562 - CVE-2020-13564, CVE-2020-13565, CVE-2020-13569, CVE-2020-13566 - CVE-2020-13568) (PoC)\nhttps://blog.talosintelligence.com/2021/01/vuln-spotlight-php-gacl-openemr.html", "creation_timestamp": "2022-06-07T18:49:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b410ed6a-06bc-476d-8bcd-094d8237c9dc/export"/>
    <published>2022-06-07T18:49:49+00:00</published>
  </entry>
</feed>
