<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T10:44:47.805738+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5589058d-446d-45e1-849b-ef8bcc7f16f4/export</id>
    <title>5589058d-446d-45e1-849b-ef8bcc7f16f4</title>
    <updated>2026-05-24T10:44:48.354537+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5589058d-446d-45e1-849b-ef8bcc7f16f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3942", "type": "seen", "source": "https://t.me/cibsecurity/10911", "content": "ATENTION\u203c New - CVE-2019-3942\n\nAdvantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote users to read files. An attacker can use this vulnerability to recover the administrator password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-01T20:58:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5589058d-446d-45e1-849b-ef8bcc7f16f4/export"/>
    <published>2020-04-01T20:58:15+00:00</published>
  </entry>
</feed>
