<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:06:31 +0000</lastBuildDate>
    <item>
      <title>f42f3551-c278-4058-841a-c739323e636e</title>
      <link>https://db.gcve.eu/sighting/f42f3551-c278-4058-841a-c739323e636e/export</link>
      <description>{"uuid": "f42f3551-c278-4058-841a-c739323e636e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26713", "type": "seen", "source": "https://t.me/cibsecurity/21958", "content": "\u203c CVE-2020-26713 \u203c\n\nREDCap 10.3.4 contains a XSS vulnerability in the ToDoList function with parameter sort. The information submitted by the user is immediately returned in the response and not escaped leading to the reflected XSS vulnerability. Attackers can exploit vulnerabilities to steal login session information or borrow user rights to perform unauthorized acts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-12T18:52:46.000000Z"}</description>
      <content:encoded>{"uuid": "f42f3551-c278-4058-841a-c739323e636e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26713", "type": "seen", "source": "https://t.me/cibsecurity/21958", "content": "\u203c CVE-2020-26713 \u203c\n\nREDCap 10.3.4 contains a XSS vulnerability in the ToDoList function with parameter sort. The information submitted by the user is immediately returned in the response and not escaped leading to the reflected XSS vulnerability. Attackers can exploit vulnerabilities to steal login session information or borrow user rights to perform unauthorized acts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-12T18:52:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f42f3551-c278-4058-841a-c739323e636e/export</guid>
      <pubDate>Tue, 12 Jan 2021 18:52:46 +0000</pubDate>
    </item>
    <item>
      <title>883fde33-90cb-47dc-8d1b-b427d5208a72</title>
      <link>https://db.gcve.eu/sighting/883fde33-90cb-47dc-8d1b-b427d5208a72/export</link>
      <description>{"uuid": "883fde33-90cb-47dc-8d1b-b427d5208a72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26710", "type": "seen", "source": "https://t.me/cibsecurity/65769", "content": "\u203c CVE-2020-26710 \u203c\n\neasy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T00:14:49.000000Z"}</description>
      <content:encoded>{"uuid": "883fde33-90cb-47dc-8d1b-b427d5208a72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26710", "type": "seen", "source": "https://t.me/cibsecurity/65769", "content": "\u203c CVE-2020-26710 \u203c\n\neasy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T00:14:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/883fde33-90cb-47dc-8d1b-b427d5208a72/export</guid>
      <pubDate>Fri, 30 Jun 2023 00:14:49 +0000</pubDate>
    </item>
  </channel>
</rss>
