<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 04:20:54 +0000</lastBuildDate>
    <item>
      <title>9971fab9-12be-4292-a84d-0aaf6de2fed8</title>
      <link>https://db.gcve.eu/sighting/9971fab9-12be-4292-a84d-0aaf6de2fed8/export</link>
      <description>{"uuid": "9971fab9-12be-4292-a84d-0aaf6de2fed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20294", "type": "seen", "source": "https://t.me/cibsecurity/22917", "content": "\u203c CVE-2020-20294 \u203c\n\nAn issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T21:25:16.000000Z"}</description>
      <content:encoded>{"uuid": "9971fab9-12be-4292-a84d-0aaf6de2fed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20294", "type": "seen", "source": "https://t.me/cibsecurity/22917", "content": "\u203c CVE-2020-20294 \u203c\n\nAn issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T21:25:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9971fab9-12be-4292-a84d-0aaf6de2fed8/export</guid>
      <pubDate>Mon, 01 Feb 2021 21:25:16 +0000</pubDate>
    </item>
    <item>
      <title>ef9ec410-dee5-4cbc-9290-13ff78d79ef1</title>
      <link>https://db.gcve.eu/sighting/ef9ec410-dee5-4cbc-9290-13ff78d79ef1/export</link>
      <description>{"uuid": "ef9ec410-dee5-4cbc-9290-13ff78d79ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20294", "type": "seen", "source": "https://t.me/Yemen_Shield/714", "content": "NEW: CVE-2020-20294 Police cars revolving light An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands. Severity: CRITICAL https://t.co/borCWA6u6u\n\nhttps://twitter.com/HackrawiX", "creation_timestamp": "2021-02-06T01:49:59.000000Z"}</description>
      <content:encoded>{"uuid": "ef9ec410-dee5-4cbc-9290-13ff78d79ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20294", "type": "seen", "source": "https://t.me/Yemen_Shield/714", "content": "NEW: CVE-2020-20294 Police cars revolving light An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands. Severity: CRITICAL https://t.co/borCWA6u6u\n\nhttps://twitter.com/HackrawiX", "creation_timestamp": "2021-02-06T01:49:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ef9ec410-dee5-4cbc-9290-13ff78d79ef1/export</guid>
      <pubDate>Sat, 06 Feb 2021 01:49:59 +0000</pubDate>
    </item>
  </channel>
</rss>
