{"vulnerability": "cve-2020-13564", "sightings": [{"uuid": "92487a51-9ab6-4822-8ce7-b74a88e3dd2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13564", "type": "seen", "source": "https://t.me/cibsecurity/22899", "content": "\u203c CVE-2020-13564 \u203c\n\nA cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T19:25:13.000000Z"}, {"uuid": "3e08d73c-003c-40e7-b5f5-a96ffd870ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-13564", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2599", "content": "Multiple vulnerabilities in phpGACL class (CVE-2020-13562 - CVE-2020-13564, CVE-2020-13565, CVE-2020-13569, CVE-2020-13566 - CVE-2020-13568) (PoC)\nhttps://blog.talosintelligence.com/2021/01/vuln-spotlight-php-gacl-openemr.html", "creation_timestamp": "2022-06-07T18:49:49.000000Z"}]}