<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 14:50:51 +0000</lastBuildDate>
    <item>
      <title>53f14535-4ba7-42b6-8be9-0b05f9ab466f</title>
      <link>https://db.gcve.eu/sighting/53f14535-4ba7-42b6-8be9-0b05f9ab466f/export</link>
      <description>{"uuid": "53f14535-4ba7-42b6-8be9-0b05f9ab466f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35129", "type": "seen", "source": "https://t.me/cibsecurity/22262", "content": "\u203c CVE-2020-35129 \u203c\n\nMautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user\u00e2\u20ac\u2122s behalf, including changing the user\u00e2\u20ac\u2122s password or email address or changing the attacker\u00e2\u20ac\u2122s user role from a low-privileged user to an administrator account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-19T16:56:03.000000Z"}</description>
      <content:encoded>{"uuid": "53f14535-4ba7-42b6-8be9-0b05f9ab466f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35129", "type": "seen", "source": "https://t.me/cibsecurity/22262", "content": "\u203c CVE-2020-35129 \u203c\n\nMautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user\u00e2\u20ac\u2122s behalf, including changing the user\u00e2\u20ac\u2122s password or email address or changing the attacker\u00e2\u20ac\u2122s user role from a low-privileged user to an administrator account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-19T16:56:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/53f14535-4ba7-42b6-8be9-0b05f9ab466f/export</guid>
      <pubDate>Tue, 19 Jan 2021 16:56:03 +0000</pubDate>
    </item>
  </channel>
</rss>
