<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 21:40:59 +0000</lastBuildDate>
    <item>
      <title>76be98b3-a51f-4092-9bc8-b169e7fa79e3</title>
      <link>https://db.gcve.eu/sighting/76be98b3-a51f-4092-9bc8-b169e7fa79e3/export</link>
      <description>{"uuid": "76be98b3-a51f-4092-9bc8-b169e7fa79e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "seen", "source": "https://t.me/cibsecurity/22786", "content": "\u203c CVE-2020-13569 \u203c\n\nA cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T16:38:27.000000Z"}</description>
      <content:encoded>{"uuid": "76be98b3-a51f-4092-9bc8-b169e7fa79e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "seen", "source": "https://t.me/cibsecurity/22786", "content": "\u203c CVE-2020-13569 \u203c\n\nA cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T16:38:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/76be98b3-a51f-4092-9bc8-b169e7fa79e3/export</guid>
      <pubDate>Thu, 28 Jan 2021 16:38:27 +0000</pubDate>
    </item>
    <item>
      <title>b410ed6a-06bc-476d-8bcd-094d8237c9dc</title>
      <link>https://db.gcve.eu/sighting/b410ed6a-06bc-476d-8bcd-094d8237c9dc/export</link>
      <description>{"uuid": "b410ed6a-06bc-476d-8bcd-094d8237c9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2599", "content": "Multiple vulnerabilities in phpGACL class (CVE-2020-13562 - CVE-2020-13564, CVE-2020-13565, CVE-2020-13569, CVE-2020-13566 - CVE-2020-13568) (PoC)\nhttps://blog.talosintelligence.com/2021/01/vuln-spotlight-php-gacl-openemr.html", "creation_timestamp": "2022-06-07T18:49:49.000000Z"}</description>
      <content:encoded>{"uuid": "b410ed6a-06bc-476d-8bcd-094d8237c9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13569", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2599", "content": "Multiple vulnerabilities in phpGACL class (CVE-2020-13562 - CVE-2020-13564, CVE-2020-13565, CVE-2020-13569, CVE-2020-13566 - CVE-2020-13568) (PoC)\nhttps://blog.talosintelligence.com/2021/01/vuln-spotlight-php-gacl-openemr.html", "creation_timestamp": "2022-06-07T18:49:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b410ed6a-06bc-476d-8bcd-094d8237c9dc/export</guid>
      <pubDate>Tue, 07 Jun 2022 18:49:49 +0000</pubDate>
    </item>
  </channel>
</rss>
