<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T10:21:24.118003+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9bf2d0d3-7fe1-4221-bb07-2e94521872a2/export</id>
    <title>9bf2d0d3-7fe1-4221-bb07-2e94521872a2</title>
    <updated>2026-05-14T10:21:24.468091+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9bf2d0d3-7fe1-4221-bb07-2e94521872a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CISCO-SA-20180129-ASA1", "type": "seen", "source": "https://t.me/canyoupwnme/3147", "content": "Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1", "creation_timestamp": "2018-01-29T23:56:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9bf2d0d3-7fe1-4221-bb07-2e94521872a2/export"/>
    <published>2018-01-29T23:56:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/535650fa-aec7-41c5-8983-55d0c38412d1/export</id>
    <title>535650fa-aec7-41c5-8983-55d0c38412d1</title>
    <updated>2026-05-14T10:21:24.467966+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "535650fa-aec7-41c5-8983-55d0c38412d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CISCO-SA-20180129-ASA1", "type": "seen", "source": "https://t.me/antichat/848", "content": "[Critical] Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability\n\nUPDATED 2/5/2018: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. Please see the Fixed Software section for more information. \n\n+++\n\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1", "creation_timestamp": "2018-02-05T19:07:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/535650fa-aec7-41c5-8983-55d0c38412d1/export"/>
    <published>2018-02-05T19:07:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/12ac2e9d-d711-4580-9f15-39d8364512b1/export</id>
    <title>12ac2e9d-d711-4580-9f15-39d8364512b1</title>
    <updated>2026-05-14T10:21:24.465932+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "12ac2e9d-d711-4580-9f15-39d8364512b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cisco-sa-20180129-asa1", "type": "seen", "source": "https://social.circl.lu/users/vulnerability_lookup/statuses/113666793493154807", "content": "", "creation_timestamp": "2024-12-17T06:41:39.517518Z"}</content>
    <link href="https://db.gcve.eu/sighting/12ac2e9d-d711-4580-9f15-39d8364512b1/export"/>
    <published>2024-12-17T06:41:39.517518+00:00</published>
  </entry>
</feed>
