<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 15:28:11 +0000</lastBuildDate>
    <item>
      <title>ce89d041-726f-458f-b054-3ee4f15e0b8d</title>
      <link>https://db.gcve.eu/sighting/ce89d041-726f-458f-b054-3ee4f15e0b8d/export</link>
      <description>{"uuid": "ce89d041-726f-458f-b054-3ee4f15e0b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-6777", "type": "seen", "source": "https://t.me/cibsecurity/22168", "content": "\u203c CVE-2020-6777 \u203c\n\nA vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:52.000000Z"}</description>
      <content:encoded>{"uuid": "ce89d041-726f-458f-b054-3ee4f15e0b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-6777", "type": "seen", "source": "https://t.me/cibsecurity/22168", "content": "\u203c CVE-2020-6777 \u203c\n\nA vulnerability in the web-based management interface of Bosch PRAESIDEO until and including version 4.41 and Bosch PRAESENSA until and including version 1.10 allows an authenticated remote attacker with admin privileges to mount a stored Cross-Site-Scripting (XSS) attack against another user. When the victim logs into the management interface, the stored script code is executed in the context of his browser. A successful exploit would allow an attacker to interact with the management interface with the privileges of the victim. However, as the attacker already needs admin privileges, there is no additional impact on the management interface itself.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ce89d041-726f-458f-b054-3ee4f15e0b8d/export</guid>
      <pubDate>Thu, 14 Jan 2021 18:49:52 +0000</pubDate>
    </item>
  </channel>
</rss>
