<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T05:37:20.552551+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/eaf338a1-7092-4b80-91eb-beacdce86f24/export</id>
    <title>eaf338a1-7092-4b80-91eb-beacdce86f24</title>
    <updated>2026-05-07T05:37:21.120539+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "eaf338a1-7092-4b80-91eb-beacdce86f24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-36085", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113959115011369633", "content": "", "creation_timestamp": "2025-02-06T21:41:40.015387Z"}</content>
    <link href="https://db.gcve.eu/sighting/eaf338a1-7092-4b80-91eb-beacdce86f24/export"/>
    <published>2025-02-06T21:41:40.015387+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/db4b915c-fd26-420d-965a-0da19f19be36/export</id>
    <title>db4b915c-fd26-420d-965a-0da19f19be36</title>
    <updated>2026-05-07T05:37:21.120414+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "db4b915c-fd26-420d-965a-0da19f19be36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-36085", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhk4g5pt4w27", "content": "", "creation_timestamp": "2025-02-06T22:16:34.122923Z"}</content>
    <link href="https://db.gcve.eu/sighting/db4b915c-fd26-420d-965a-0da19f19be36/export"/>
    <published>2025-02-06T22:16:34.122923+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/493b38e2-3cfa-41d2-bf46-041d073d18da/export</id>
    <title>493b38e2-3cfa-41d2-bf46-041d073d18da</title>
    <updated>2026-05-07T05:37:21.120224+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "493b38e2-3cfa-41d2-bf46-041d073d18da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-36085", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6afu2pj26", "content": "", "creation_timestamp": "2025-02-06T22:49:10.979922Z"}</content>
    <link href="https://db.gcve.eu/sighting/493b38e2-3cfa-41d2-bf46-041d073d18da/export"/>
    <published>2025-02-06T22:49:10.979922+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dffb4ccd-e4d1-4766-a981-4cbc47feb037/export</id>
    <title>dffb4ccd-e4d1-4766-a981-4cbc47feb037</title>
    <updated>2026-05-07T05:37:21.113747+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dffb4ccd-e4d1-4766-a981-4cbc47feb037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-36085", "type": "seen", "source": "https://t.me/cvedetector/17440", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-36085 - Egavilan Media Resumes Management and Job Application Website Stored Cross Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2020-36085 \nPublished : Feb. 6, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : Stored Cross Site Scripting(XSS) vulnerability in Egavilan Media Resumes Management and Job Application Website 1.0 allows remote attackers to inject arbitrary code via First and Last Name in Apply For This Job Form. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dffb4ccd-e4d1-4766-a981-4cbc47feb037/export"/>
    <published>2025-02-07T00:26:04+00:00</published>
  </entry>
</feed>
