<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:42:33.918787+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export</id>
    <title>d210bfd7-ea93-4578-84e4-438903e47d76</title>
    <updated>2026-05-06T11:42:34.435945+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d210bfd7-ea93-4578-84e4-438903e47d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "published-proof-of-concept", "source": "Telegram/Tvd8QL4SENBdyhrOX8ClGh5gThmxL9s_lOp2aXg1VdaPgg", "content": "", "creation_timestamp": "2021-08-02T20:29:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export"/>
    <published>2021-08-02T20:29:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export</id>
    <title>595d63b2-6a06-4e46-9627-4639ac65963e</title>
    <updated>2026-05-06T11:42:34.435853+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "595d63b2-6a06-4e46-9627-4639ac65963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/509", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 29 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-23T21:20:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export"/>
    <published>2023-11-23T21:20:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export</id>
    <title>1e1a3245-bfbc-47c2-a92a-5c5308aff6b2</title>
    <updated>2026-05-06T11:42:34.433917+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1e1a3245-bfbc-47c2-a92a-5c5308aff6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/2017", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 31 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T15:54:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export"/>
    <published>2023-12-18T15:54:31+00:00</published>
  </entry>
</feed>
