<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T23:14:50.424668+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9974902e-ce66-4693-9a4c-9629a6586e24/export</id>
    <title>9974902e-ce66-4693-9a4c-9629a6586e24</title>
    <updated>2026-05-03T23:14:50.746608+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9974902e-ce66-4693-9a4c-9629a6586e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20482", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9974902e-ce66-4693-9a4c-9629a6586e24/export"/>
    <published>2020-12-11T22:38:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7bdf4479-23a4-43ef-8467-a8813a90138f/export</id>
    <title>7bdf4479-23a4-43ef-8467-a8813a90138f</title>
    <updated>2026-05-03T23:14:50.746560+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7bdf4479-23a4-43ef-8467-a8813a90138f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20501", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7bdf4479-23a4-43ef-8467-a8813a90138f/export"/>
    <published>2020-12-11T22:54:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/65b820d6-dceb-4fe9-adf4-04a32e203265/export</id>
    <title>65b820d6-dceb-4fe9-adf4-04a32e203265</title>
    <updated>2026-05-03T23:14:50.746511+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "65b820d6-dceb-4fe9-adf4-04a32e203265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20521", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/65b820d6-dceb-4fe9-adf4-04a32e203265/export"/>
    <published>2020-12-11T23:25:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1e383fc9-5f8d-4024-a953-6061d0b16381/export</id>
    <title>1e383fc9-5f8d-4024-a953-6061d0b16381</title>
    <updated>2026-05-03T23:14:50.746462+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1e383fc9-5f8d-4024-a953-6061d0b16381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20541", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1e383fc9-5f8d-4024-a953-6061d0b16381/export"/>
    <published>2020-12-12T00:25:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6cf33182-472c-4397-853d-ffe394a8bda3/export</id>
    <title>6cf33182-472c-4397-853d-ffe394a8bda3</title>
    <updated>2026-05-03T23:14:50.746399+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6cf33182-472c-4397-853d-ffe394a8bda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20554", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6cf33182-472c-4397-853d-ffe394a8bda3/export"/>
    <published>2020-12-12T00:35:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/49aa2c8f-df05-4c48-a95a-fd325f27eeb6/export</id>
    <title>49aa2c8f-df05-4c48-a95a-fd325f27eeb6</title>
    <updated>2026-05-03T23:14:50.746344+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "49aa2c8f-df05-4c48-a95a-fd325f27eeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20574", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/49aa2c8f-df05-4c48-a95a-fd325f27eeb6/export"/>
    <published>2020-12-12T00:45:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6cd0633d-b8db-43df-8816-cdc1ac248329/export</id>
    <title>6cd0633d-b8db-43df-8816-cdc1ac248329</title>
    <updated>2026-05-03T23:14:50.746290+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6cd0633d-b8db-43df-8816-cdc1ac248329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20593", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6cd0633d-b8db-43df-8816-cdc1ac248329/export"/>
    <published>2020-12-12T01:05:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a4353920-d8e9-40c6-8538-2532bbc76ba7/export</id>
    <title>a4353920-d8e9-40c6-8538-2532bbc76ba7</title>
    <updated>2026-05-03T23:14:50.746223+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a4353920-d8e9-40c6-8538-2532bbc76ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20613", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a4353920-d8e9-40c6-8538-2532bbc76ba7/export"/>
    <published>2020-12-12T01:25:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cd7cef5f-db20-40d6-a448-fdd6e8e32113/export</id>
    <title>cd7cef5f-db20-40d6-a448-fdd6e8e32113</title>
    <updated>2026-05-03T23:14:50.746126+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cd7cef5f-db20-40d6-a448-fdd6e8e32113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20633", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cd7cef5f-db20-40d6-a448-fdd6e8e32113/export"/>
    <published>2020-12-12T02:25:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f7f8cc18-272e-4d74-a898-5c060a5d34ec/export</id>
    <title>f7f8cc18-272e-4d74-a898-5c060a5d34ec</title>
    <updated>2026-05-03T23:14:50.744949+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f7f8cc18-272e-4d74-a898-5c060a5d34ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2306", "content": "F5 Big IP Vulnerabilities:\n1. F5 TMUI XSS vulnerability (CVE-2020-5948)\nhttps://support.f5.com/csp/article/K42696541\n]-&amp;gt; Restricting access to the Configuration utility by source IP address (11.x-16.x)\nhttps://support.f5.com/csp/article/K13309\n]-&amp;gt; Overview of securing access to the BIG-IP system\n2. BIG-IP LTM vulnerability (CVE-2020-5949)\nhttps://support.f5.com/csp/article/K20984059\n]-&amp;gt; Configuring SYN cookie protection (13.x-16.x)\nhttps://support.f5.com/csp/article/K74451051", "creation_timestamp": "2020-12-16T12:01:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f7f8cc18-272e-4d74-a898-5c060a5d34ec/export"/>
    <published>2020-12-16T12:01:59+00:00</published>
  </entry>
</feed>
