<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T17:57:37.274895+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d404a432-05e6-4f16-a2cd-f9ac6c64d827/export</id>
    <title>d404a432-05e6-4f16-a2cd-f9ac6c64d827</title>
    <updated>2026-05-14T17:57:37.814514+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d404a432-05e6-4f16-a2cd-f9ac6c64d827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-47877", "type": "seen", "source": "https://t.me/cibsecurity/63176", "content": "\u203c CVE-2022-47877 \u203c\n\nA Stored cross-site scripting vulnerability in Jedox 2020.2.5 allows remote, authenticated users to inject arbitrary web script or HTML in the Logs page via the log module 'log'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-03T00:30:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d404a432-05e6-4f16-a2cd-f9ac6c64d827/export"/>
    <published>2023-05-03T00:30:26+00:00</published>
  </entry>
</feed>
