<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T07:06:41.863677+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b427d8a5-a58f-41f0-815d-2abc55443822/export</id>
    <title>b427d8a5-a58f-41f0-815d-2abc55443822</title>
    <updated>2026-05-01T07:06:42.191515+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b427d8a5-a58f-41f0-815d-2abc55443822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20296", "type": "seen", "source": "https://t.me/cibsecurity/22908", "content": "\u203c CVE-2020-20296 \u203c\n\nAn issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T21:25:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b427d8a5-a58f-41f0-815d-2abc55443822/export"/>
    <published>2021-02-01T21:25:07+00:00</published>
  </entry>
</feed>
