<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 05:08:42 +0000</lastBuildDate>
    <item>
      <title>80571bd5-bde7-4ecf-b85a-49a09808a29a</title>
      <link>https://db.gcve.eu/sighting/80571bd5-bde7-4ecf-b85a-49a09808a29a/export</link>
      <description>{"uuid": "80571bd5-bde7-4ecf-b85a-49a09808a29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-2005", "type": "exploited", "source": "https://t.me/xakep_ru/10416", "content": "\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0410\u041d\u0411 \u0437\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043b\u0435\u0442 \u0434\u043e \u0443\u0442\u0435\u0447\u043a\u0438 The Shadow Brokers\n\n\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0430\u044f \u0445\u0430\u043a-\u0433\u0440\u0443\u043f\u043f\u0430 APT31 (\u043e\u043d\u0430 \u0436\u0435 Zirconium) \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2017-2005 \u0437\u0430 \u0442\u0440\u0438 \u0433\u043e\u0434\u0430 \u0434\u043e \u0442\u043e\u0433\u043e \u043c\u043e\u043c\u0435\u043d\u0442\u0430, \u043a\u0430\u043a \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 The Shadow Brokers \u00ab\u0441\u043b\u0438\u043b\u0430\u00bb \u044d\u0442\u043e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f, \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438, \u043f\u043e\u0445\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0443 \u0410\u041d\u0411.\n\nhttps://xakep.ru/2021/02/24/jian-and-epme/", "creation_timestamp": "2021-02-24T12:35:12.000000Z"}</description>
      <content:encoded>{"uuid": "80571bd5-bde7-4ecf-b85a-49a09808a29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-2005", "type": "exploited", "source": "https://t.me/xakep_ru/10416", "content": "\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0410\u041d\u0411 \u0437\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043b\u0435\u0442 \u0434\u043e \u0443\u0442\u0435\u0447\u043a\u0438 The Shadow Brokers\n\n\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0430\u044f \u0445\u0430\u043a-\u0433\u0440\u0443\u043f\u043f\u0430 APT31 (\u043e\u043d\u0430 \u0436\u0435 Zirconium) \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2017-2005 \u0437\u0430 \u0442\u0440\u0438 \u0433\u043e\u0434\u0430 \u0434\u043e \u0442\u043e\u0433\u043e \u043c\u043e\u043c\u0435\u043d\u0442\u0430, \u043a\u0430\u043a \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 The Shadow Brokers \u00ab\u0441\u043b\u0438\u043b\u0430\u00bb \u044d\u0442\u043e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f, \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438, \u043f\u043e\u0445\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0443 \u0410\u041d\u0411.\n\nhttps://xakep.ru/2021/02/24/jian-and-epme/", "creation_timestamp": "2021-02-24T12:35:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/80571bd5-bde7-4ecf-b85a-49a09808a29a/export</guid>
      <pubDate>Wed, 24 Feb 2021 12:35:12 +0000</pubDate>
    </item>
    <item>
      <title>9b896821-aa9e-429b-9273-7964356c6a63</title>
      <link>https://db.gcve.eu/sighting/9b896821-aa9e-429b-9273-7964356c6a63/export</link>
      <description>{"uuid": "9b896821-aa9e-429b-9273-7964356c6a63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20052", "type": "seen", "source": "https://t.me/cibsecurity/44604", "content": "\u203c CVE-2017-20052 \u203c\n\nA vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T12:21:13.000000Z"}</description>
      <content:encoded>{"uuid": "9b896821-aa9e-429b-9273-7964356c6a63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20052", "type": "seen", "source": "https://t.me/cibsecurity/44604", "content": "\u203c CVE-2017-20052 \u203c\n\nA vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T12:21:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9b896821-aa9e-429b-9273-7964356c6a63/export</guid>
      <pubDate>Thu, 16 Jun 2022 12:21:13 +0000</pubDate>
    </item>
    <item>
      <title>4306ae1c-8f19-4992-a238-efd9dae7e7c7</title>
      <link>https://db.gcve.eu/sighting/4306ae1c-8f19-4992-a238-efd9dae7e7c7/export</link>
      <description>{"uuid": "4306ae1c-8f19-4992-a238-efd9dae7e7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20051", "type": "seen", "source": "https://t.me/cibsecurity/44606", "content": "\u203c CVE-2017-20051 \u203c\n\nA vulnerability was found in InnoSetup Installer. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to uncontrolled search path. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T12:21:15.000000Z"}</description>
      <content:encoded>{"uuid": "4306ae1c-8f19-4992-a238-efd9dae7e7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20051", "type": "seen", "source": "https://t.me/cibsecurity/44606", "content": "\u203c CVE-2017-20051 \u203c\n\nA vulnerability was found in InnoSetup Installer. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to uncontrolled search path. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T12:21:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4306ae1c-8f19-4992-a238-efd9dae7e7c7/export</guid>
      <pubDate>Thu, 16 Jun 2022 12:21:15 +0000</pubDate>
    </item>
    <item>
      <title>07f8aee6-cd44-4a6f-976f-86f772d52e6c</title>
      <link>https://db.gcve.eu/sighting/07f8aee6-cd44-4a6f-976f-86f772d52e6c/export</link>
      <description>{"uuid": "07f8aee6-cd44-4a6f-976f-86f772d52e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20056", "type": "seen", "source": "https://t.me/cibsecurity/44618", "content": "\u203c CVE-2017-20056 \u203c\n\nA vulnerability was found in weblizar User Login Log Plugin 2.2.1. It has been classified as problematic. Affected is an unknown function. The manipulation leads to basic cross site scripting (Stored). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:19.000000Z"}</description>
      <content:encoded>{"uuid": "07f8aee6-cd44-4a6f-976f-86f772d52e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20056", "type": "seen", "source": "https://t.me/cibsecurity/44618", "content": "\u203c CVE-2017-20056 \u203c\n\nA vulnerability was found in weblizar User Login Log Plugin 2.2.1. It has been classified as problematic. Affected is an unknown function. The manipulation leads to basic cross site scripting (Stored). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/07f8aee6-cd44-4a6f-976f-86f772d52e6c/export</guid>
      <pubDate>Thu, 16 Jun 2022 16:20:19 +0000</pubDate>
    </item>
    <item>
      <title>ed80ee21-3253-467f-be9c-64312969442a</title>
      <link>https://db.gcve.eu/sighting/ed80ee21-3253-467f-be9c-64312969442a/export</link>
      <description>{"uuid": "ed80ee21-3253-467f-be9c-64312969442a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20054", "type": "seen", "source": "https://t.me/cibsecurity/44620", "content": "\u203c CVE-2017-20054 \u203c\n\nA vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:21.000000Z"}</description>
      <content:encoded>{"uuid": "ed80ee21-3253-467f-be9c-64312969442a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20054", "type": "seen", "source": "https://t.me/cibsecurity/44620", "content": "\u203c CVE-2017-20054 \u203c\n\nA vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ed80ee21-3253-467f-be9c-64312969442a/export</guid>
      <pubDate>Thu, 16 Jun 2022 16:20:21 +0000</pubDate>
    </item>
    <item>
      <title>f3c34b3a-0726-483a-8e35-743e9ac73474</title>
      <link>https://db.gcve.eu/sighting/f3c34b3a-0726-483a-8e35-743e9ac73474/export</link>
      <description>{"uuid": "f3c34b3a-0726-483a-8e35-743e9ac73474", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20053", "type": "seen", "source": "https://t.me/cibsecurity/44619", "content": "\u203c CVE-2017-20053 \u203c\n\nA vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:21.000000Z"}</description>
      <content:encoded>{"uuid": "f3c34b3a-0726-483a-8e35-743e9ac73474", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20053", "type": "seen", "source": "https://t.me/cibsecurity/44619", "content": "\u203c CVE-2017-20053 \u203c\n\nA vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f3c34b3a-0726-483a-8e35-743e9ac73474/export</guid>
      <pubDate>Thu, 16 Jun 2022 16:20:21 +0000</pubDate>
    </item>
    <item>
      <title>d146cca0-c1b7-4c33-86ed-2c1abef52be7</title>
      <link>https://db.gcve.eu/sighting/d146cca0-c1b7-4c33-86ed-2c1abef52be7/export</link>
      <description>{"uuid": "d146cca0-c1b7-4c33-86ed-2c1abef52be7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20055", "type": "seen", "source": "https://t.me/cibsecurity/44622", "content": "\u203c CVE-2017-20055 \u203c\n\nA vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:26.000000Z"}</description>
      <content:encoded>{"uuid": "d146cca0-c1b7-4c33-86ed-2c1abef52be7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20055", "type": "seen", "source": "https://t.me/cibsecurity/44622", "content": "\u203c CVE-2017-20055 \u203c\n\nA vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T16:20:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d146cca0-c1b7-4c33-86ed-2c1abef52be7/export</guid>
      <pubDate>Thu, 16 Jun 2022 16:20:26 +0000</pubDate>
    </item>
    <item>
      <title>762ca3a0-fe82-4707-b7ca-713b8082cd05</title>
      <link>https://db.gcve.eu/sighting/762ca3a0-fe82-4707-b7ca-713b8082cd05/export</link>
      <description>{"uuid": "762ca3a0-fe82-4707-b7ca-713b8082cd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20058", "type": "seen", "source": "https://t.me/cibsecurity/44809", "content": "\u203c CVE-2017-20058 \u203c\n\nA vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:15.000000Z"}</description>
      <content:encoded>{"uuid": "762ca3a0-fe82-4707-b7ca-713b8082cd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20058", "type": "seen", "source": "https://t.me/cibsecurity/44809", "content": "\u203c CVE-2017-20058 \u203c\n\nA vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/762ca3a0-fe82-4707-b7ca-713b8082cd05/export</guid>
      <pubDate>Mon, 20 Jun 2022 12:26:15 +0000</pubDate>
    </item>
    <item>
      <title>92a3cc54-35b5-42c0-8c28-b1b98185757a</title>
      <link>https://db.gcve.eu/sighting/92a3cc54-35b5-42c0-8c28-b1b98185757a/export</link>
      <description>{"uuid": "92a3cc54-35b5-42c0-8c28-b1b98185757a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20057", "type": "seen", "source": "https://t.me/cibsecurity/44812", "content": "\u203c CVE-2017-20057 \u203c\n\nA vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:19.000000Z"}</description>
      <content:encoded>{"uuid": "92a3cc54-35b5-42c0-8c28-b1b98185757a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20057", "type": "seen", "source": "https://t.me/cibsecurity/44812", "content": "\u203c CVE-2017-20057 \u203c\n\nA vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/92a3cc54-35b5-42c0-8c28-b1b98185757a/export</guid>
      <pubDate>Mon, 20 Jun 2022 12:26:19 +0000</pubDate>
    </item>
    <item>
      <title>478d6a12-c908-4590-82f3-f934ebf38527</title>
      <link>https://db.gcve.eu/sighting/478d6a12-c908-4590-82f3-f934ebf38527/export</link>
      <description>{"uuid": "478d6a12-c908-4590-82f3-f934ebf38527", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20059", "type": "seen", "source": "https://t.me/cibsecurity/44816", "content": "\u203c CVE-2017-20059 \u203c\n\nA vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input  leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:24.000000Z"}</description>
      <content:encoded>{"uuid": "478d6a12-c908-4590-82f3-f934ebf38527", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-20059", "type": "seen", "source": "https://t.me/cibsecurity/44816", "content": "\u203c CVE-2017-20059 \u203c\n\nA vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input  leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T12:26:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/478d6a12-c908-4590-82f3-f934ebf38527/export</guid>
      <pubDate>Mon, 20 Jun 2022 12:26:24 +0000</pubDate>
    </item>
  </channel>
</rss>
