<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T02:01:06.818078+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/11f5c621-2942-48cf-86a6-6e5f31417ef3/export</id>
    <title>11f5c621-2942-48cf-86a6-6e5f31417ef3</title>
    <updated>2026-05-20T02:01:07.177869+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "11f5c621-2942-48cf-86a6-6e5f31417ef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20132", "type": "seen", "source": "https://t.me/cibsecurity/34784", "content": "\u203c CVE-2021-20132 \u203c\n\nQuagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the \"admin\" user, UID 0).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-31T00:34:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/11f5c621-2942-48cf-86a6-6e5f31417ef3/export"/>
    <published>2021-12-31T00:34:44+00:00</published>
  </entry>
</feed>
