<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T04:48:06.853292+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/772daf43-0fdb-4b6d-9015-fea08c604ef3/export</id>
    <title>772daf43-0fdb-4b6d-9015-fea08c604ef3</title>
    <updated>2026-05-17T04:48:07.218465+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "772daf43-0fdb-4b6d-9015-fea08c604ef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-4786", "type": "seen", "source": "https://t.me/cibsecurity/22738", "content": "\u203c CVE-2020-4786 \u203c\n\nIBM QRadar SIEM 7.4.2 GA to 7.4.2 Patch 1, 7.4.0 to 7.4.1 Patch 1, and 7.3.0 to 7.3.3 Patch 5 is vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 189221.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-27T20:37:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/772daf43-0fdb-4b6d-9015-fea08c604ef3/export"/>
    <published>2021-01-27T20:37:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2b2cac6a-daaf-40c9-b893-5b612823e494/export</id>
    <title>2b2cac6a-daaf-40c9-b893-5b612823e494</title>
    <updated>2026-05-17T04:48:07.218163+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2b2cac6a-daaf-40c9-b893-5b612823e494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-4786", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/51", "content": "PoC for SSRF in IBM QRadar SIEM (CVE-2020-4786)\n\nGET /console/chartServer?output=image&amp;amp;data=http://127.0.0.1:8080", "creation_timestamp": "2021-07-07T14:28:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2b2cac6a-daaf-40c9-b893-5b612823e494/export"/>
    <published>2021-07-07T14:28:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/05ae25ab-3b91-4dc6-89ad-782bf5c34417/export</id>
    <title>05ae25ab-3b91-4dc6-89ad-782bf5c34417</title>
    <updated>2026-05-17T04:48:07.215449+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "05ae25ab-3b91-4dc6-89ad-782bf5c34417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-4786", "type": "seen", "source": "https://t.me/cibsecurity/33217", "content": "\u203c CVE-2021-29863 \u203c\n\nIBM QRadar SIEM 7.3 and 7.4 is vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. This vulnerability is due to an incomplete fix for CVE-2020-4786. IBM X-Force ID: 206087.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-01T20:35:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/05ae25ab-3b91-4dc6-89ad-782bf5c34417/export"/>
    <published>2021-12-01T20:35:33+00:00</published>
  </entry>
</feed>
