<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T10:16:17.673624+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/cd0fbce8-adb9-4916-858c-e2a34a82deb7/export</id>
    <title>cd0fbce8-adb9-4916-858c-e2a34a82deb7</title>
    <updated>2026-05-03T10:16:18.035989+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cd0fbce8-adb9-4916-858c-e2a34a82deb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2008-4873", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/6864", "content": "", "creation_timestamp": "2008-10-29T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cd0fbce8-adb9-4916-858c-e2a34a82deb7/export"/>
    <published>2008-10-29T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f0694709-f535-42df-9ddd-cb1e76f4e7bb/export</id>
    <title>f0694709-f535-42df-9ddd-cb1e76f4e7bb</title>
    <updated>2026-05-03T10:16:18.034025+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f0694709-f535-42df-9ddd-cb1e76f4e7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2008-4873", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/107", "content": "#Analytics\n25 vulnerabilities/exploits used by IoT Botnet (Mirai, Qbot, Gafygt etc.)\n1. CVE-2015-2280: AirLink101 IPCam 1620W OS CI\n2. CVE-2017-17215: Huawei Router HG532 Arbitrary Command Execution\n3. CVE-2018-10561, CVE-2018-10562 - GPON Routers Auth Bypass/Command Injection\n4. CVE-2018-14417: SoftNAS Cloud &amp;lt;4.0.3 OS CI\n5. CVE-2014-8361: Realtek SDK Miniigd UPnP SOAP Command Execution\n6. CVE-2017-5638: Apache Struts 2.x RCE\n7. CVE-2018-9866: SonicWall SMS RCE\n8. CVE-2017-6884: Zyxel EMG2926 OS CI\n9. CVE-2015-2051: HNAP SoapAction Header Command Execution\n10. CVE-2008-4873: Sepal SPBOARD 4.5 - \"board.cgi\" RCE\n11. CVE-2016-6277: NETGEAR R7000 - CI\n12. D-Link DSL-2750B - OS CI\n13. CAM Wireless IP Camera - Unauth RCE\n14. Eir D1000 Wireless Router - WAN Side RCI\n15. TUTOS 1.3 \"cmd.php\" RCE\n16. WP Plugin DZS-VideoGallery - CSS/CI\n17. Netgear DGN1000 - Setup.cgi RCE\n18. Web Attack (CCTV-DVR RCE)\n19. MVPower DVR TV-7104HE - Shell Command Execution\n20. Vacron NVR RCE\n21. Linksys E-series - RCE\n22. D-Link command.php RCE\n23. EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - RCE\n24. AVTech IP Camera/NVR/DVR Devices - Multiple Vulns\n25. NetGain \"ping\" Command Injection", "creation_timestamp": "2024-10-11T09:08:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f0694709-f535-42df-9ddd-cb1e76f4e7bb/export"/>
    <published>2024-10-11T09:08:41+00:00</published>
  </entry>
</feed>
