<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 17:24:29 +0000</lastBuildDate>
    <item>
      <title>a0b6da46-dbe2-472b-9291-fd4bed9fad0e</title>
      <link>https://db.gcve.eu/sighting/a0b6da46-dbe2-472b-9291-fd4bed9fad0e/export</link>
      <description>{"uuid": "a0b6da46-dbe2-472b-9291-fd4bed9fad0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/16679", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-20T22:43:01.000000Z"}</description>
      <content:encoded>{"uuid": "a0b6da46-dbe2-472b-9291-fd4bed9fad0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/16679", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-20T22:43:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a0b6da46-dbe2-472b-9291-fd4bed9fad0e/export</guid>
      <pubDate>Fri, 20 Nov 2020 22:43:01 +0000</pubDate>
    </item>
    <item>
      <title>e640f841-387a-4d48-9712-762af4512854</title>
      <link>https://db.gcve.eu/sighting/e640f841-387a-4d48-9712-762af4512854/export</link>
      <description>{"uuid": "e640f841-387a-4d48-9712-762af4512854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/17425", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:25:31.000000Z"}</description>
      <content:encoded>{"uuid": "e640f841-387a-4d48-9712-762af4512854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28845", "type": "seen", "source": "https://t.me/cibsecurity/17425", "content": "\u203c CVE-2020-28845 \u203c\n\nA CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:25:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e640f841-387a-4d48-9712-762af4512854/export</guid>
      <pubDate>Wed, 09 Dec 2020 07:25:31 +0000</pubDate>
    </item>
    <item>
      <title>5cae3c59-b216-41ab-8b12-bb9054ab4d66</title>
      <link>https://db.gcve.eu/sighting/5cae3c59-b216-41ab-8b12-bb9054ab4d66/export</link>
      <description>{"uuid": "5cae3c59-b216-41ab-8b12-bb9054ab4d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28841", "type": "seen", "source": "https://t.me/cibsecurity/21513", "content": "\u203c CVE-2020-28841 \u203c\n\nMyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cause a system crash via the ioctl command 0x9c402000 to \\\\.\\MyDrivers0_0_1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-03T07:34:55.000000Z"}</description>
      <content:encoded>{"uuid": "5cae3c59-b216-41ab-8b12-bb9054ab4d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28841", "type": "seen", "source": "https://t.me/cibsecurity/21513", "content": "\u203c CVE-2020-28841 \u203c\n\nMyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cause a system crash via the ioctl command 0x9c402000 to \\\\.\\MyDrivers0_0_1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-03T07:34:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5cae3c59-b216-41ab-8b12-bb9054ab4d66/export</guid>
      <pubDate>Sun, 03 Jan 2021 07:34:55 +0000</pubDate>
    </item>
    <item>
      <title>909675a5-6e88-4e49-bbd9-5695c4f6a1d1</title>
      <link>https://db.gcve.eu/sighting/909675a5-6e88-4e49-bbd9-5695c4f6a1d1/export</link>
      <description>{"uuid": "909675a5-6e88-4e49-bbd9-5695c4f6a1d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28846", "type": "seen", "source": "https://t.me/cibsecurity/27440", "content": "\u203c CVE-2020-28846 \u203c\n\nCross Site Request Forgery (CSRF) vulnerability exists in SeaCMS 10.7 in admin_manager.php, which could let a malicious user add an admin account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-17T20:16:02.000000Z"}</description>
      <content:encoded>{"uuid": "909675a5-6e88-4e49-bbd9-5695c4f6a1d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28846", "type": "seen", "source": "https://t.me/cibsecurity/27440", "content": "\u203c CVE-2020-28846 \u203c\n\nCross Site Request Forgery (CSRF) vulnerability exists in SeaCMS 10.7 in admin_manager.php, which could let a malicious user add an admin account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-17T20:16:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/909675a5-6e88-4e49-bbd9-5695c4f6a1d1/export</guid>
      <pubDate>Tue, 17 Aug 2021 20:16:02 +0000</pubDate>
    </item>
    <item>
      <title>34ce8d1d-dd06-4281-b63a-eb40fe63eb08</title>
      <link>https://db.gcve.eu/sighting/34ce8d1d-dd06-4281-b63a-eb40fe63eb08/export</link>
      <description>{"uuid": "34ce8d1d-dd06-4281-b63a-eb40fe63eb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28847", "type": "seen", "source": "https://t.me/cibsecurity/40173", "content": "\u203c CVE-2020-28847 \u203c\n\nCross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T20:28:55.000000Z"}</description>
      <content:encoded>{"uuid": "34ce8d1d-dd06-4281-b63a-eb40fe63eb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28847", "type": "seen", "source": "https://t.me/cibsecurity/40173", "content": "\u203c CVE-2020-28847 \u203c\n\nCross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T20:28:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/34ce8d1d-dd06-4281-b63a-eb40fe63eb08/export</guid>
      <pubDate>Tue, 05 Apr 2022 20:28:55 +0000</pubDate>
    </item>
    <item>
      <title>8d0023c6-c535-4088-8037-b4ca0df83600</title>
      <link>https://db.gcve.eu/sighting/8d0023c6-c535-4088-8037-b4ca0df83600/export</link>
      <description>{"uuid": "8d0023c6-c535-4088-8037-b4ca0df83600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7921", "content": "#exploit\n1. CVE-2020-2546, CVE-2020-2915,\nCVE-2020-2801, CVE-2020-2798,\nCVE-2020-2883, CVE-2020-2884,\nCVE-2020-2950:\nWebLogic T3 payload exploit PoC python3\nhttps://github.com/hktalent/CVE_2020_2546\n\n2. Tips, Tricks, and Scripts for Linux Post Exploitation\nhttps://github.com/regorsec/Linux-Post-Exploitation\n\n3. CVE-2023-23488:\nUnauthenticated SQL Injection - Paid Memberships Pro &amp;lt; 2.9.8 (WordPress Plugin)\nhttps://github.com/r3nt0n/CVE-2023-23488-PoC", "creation_timestamp": "2023-03-13T22:21:06.000000Z"}</description>
      <content:encoded>{"uuid": "8d0023c6-c535-4088-8037-b4ca0df83600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7921", "content": "#exploit\n1. CVE-2020-2546, CVE-2020-2915,\nCVE-2020-2801, CVE-2020-2798,\nCVE-2020-2883, CVE-2020-2884,\nCVE-2020-2950:\nWebLogic T3 payload exploit PoC python3\nhttps://github.com/hktalent/CVE_2020_2546\n\n2. Tips, Tricks, and Scripts for Linux Post Exploitation\nhttps://github.com/regorsec/Linux-Post-Exploitation\n\n3. CVE-2023-23488:\nUnauthenticated SQL Injection - Paid Memberships Pro &amp;lt; 2.9.8 (WordPress Plugin)\nhttps://github.com/r3nt0n/CVE-2023-23488-PoC", "creation_timestamp": "2023-03-13T22:21:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8d0023c6-c535-4088-8037-b4ca0df83600/export</guid>
      <pubDate>Mon, 13 Mar 2023 22:21:06 +0000</pubDate>
    </item>
    <item>
      <title>0052c38a-9b19-466b-a980-4b5a7a93926a</title>
      <link>https://db.gcve.eu/sighting/0052c38a-9b19-466b-a980-4b5a7a93926a/export</link>
      <description>{"uuid": "0052c38a-9b19-466b-a980-4b5a7a93926a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "published-proof-of-concept", "source": "Telegram/5T9p9Zashh8_t2QaMEcrWCxGmV69ND__6VmH0ET2CJ3Gp-A", "content": "", "creation_timestamp": "2023-03-14T09:24:23.000000Z"}</description>
      <content:encoded>{"uuid": "0052c38a-9b19-466b-a980-4b5a7a93926a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2884", "type": "published-proof-of-concept", "source": "Telegram/5T9p9Zashh8_t2QaMEcrWCxGmV69ND__6VmH0ET2CJ3Gp-A", "content": "", "creation_timestamp": "2023-03-14T09:24:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0052c38a-9b19-466b-a980-4b5a7a93926a/export</guid>
      <pubDate>Tue, 14 Mar 2023 09:24:23 +0000</pubDate>
    </item>
    <item>
      <title>c6f35218-bf7c-4cbc-847a-8395aab03dec</title>
      <link>https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export</link>
      <description>{"uuid": "c6f35218-bf7c-4cbc-847a-8395aab03dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28849", "type": "seen", "source": "https://t.me/cibsecurity/68354", "content": "\u203c CVE-2020-28849 \u203c\n\nCross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:57.000000Z"}</description>
      <content:encoded>{"uuid": "c6f35218-bf7c-4cbc-847a-8395aab03dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28849", "type": "seen", "source": "https://t.me/cibsecurity/68354", "content": "\u203c CVE-2020-28849 \u203c\n\nCross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c6f35218-bf7c-4cbc-847a-8395aab03dec/export</guid>
      <pubDate>Fri, 11 Aug 2023 18:16:57 +0000</pubDate>
    </item>
  </channel>
</rss>
