<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T05:24:43.148476+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/47e85ff2-1422-43e0-b655-32960b64afcd/export</id>
    <title>47e85ff2-1422-43e0-b655-32960b64afcd</title>
    <updated>2026-05-04T05:24:43.600945+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "47e85ff2-1422-43e0-b655-32960b64afcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28939", "type": "seen", "source": "https://t.me/cibsecurity/17092", "content": "\u203c CVE-2020-28939 \u203c\n\nOpenClinic version 0.8.2 is affected by a medical/test_new.php insecure file upload vulnerability. This vulnerability allows authenticated users (with substantial privileges) to upload malicious files, such as PHP web shells, which can lead to arbitrary code execution on the application server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-03T18:25:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/47e85ff2-1422-43e0-b655-32960b64afcd/export"/>
    <published>2020-12-03T18:25:18+00:00</published>
  </entry>
</feed>
