<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 19:30:24 +0000</lastBuildDate>
    <item>
      <title>87f496e8-6363-4258-8fb8-a84b8f683d97</title>
      <link>https://db.gcve.eu/sighting/87f496e8-6363-4258-8fb8-a84b8f683d97/export</link>
      <description>{"uuid": "87f496e8-6363-4258-8fb8-a84b8f683d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28337", "type": "seen", "source": "https://t.me/cibsecurity/23614", "content": "\u203c CVE-2020-28337 \u203c\n\nA directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-15T22:46:52.000000Z"}</description>
      <content:encoded>{"uuid": "87f496e8-6363-4258-8fb8-a84b8f683d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28337", "type": "seen", "source": "https://t.me/cibsecurity/23614", "content": "\u203c CVE-2020-28337 \u203c\n\nA directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-15T22:46:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/87f496e8-6363-4258-8fb8-a84b8f683d97/export</guid>
      <pubDate>Mon, 15 Feb 2021 22:46:52 +0000</pubDate>
    </item>
    <item>
      <title>79e10f39-84b2-4d07-9379-18df35034565</title>
      <link>https://db.gcve.eu/sighting/79e10f39-84b2-4d07-9379-18df35034565/export</link>
      <description>{"uuid": "79e10f39-84b2-4d07-9379-18df35034565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28337", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/401", "content": "CVE-2020-28337 Microweber CMS 1.1.20 \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-28337_Microweber_CMS_1.1.20_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-05-11T03:46:20.000000Z"}</description>
      <content:encoded>{"uuid": "79e10f39-84b2-4d07-9379-18df35034565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28337", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/401", "content": "CVE-2020-28337 Microweber CMS 1.1.20 \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-28337_Microweber_CMS_1.1.20_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-05-11T03:46:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/79e10f39-84b2-4d07-9379-18df35034565/export</guid>
      <pubDate>Tue, 11 May 2021 03:46:20 +0000</pubDate>
    </item>
  </channel>
</rss>
