<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T23:18:56.228184+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/125be5d7-91f4-4bd6-90d1-b78faf24b2aa/export</id>
    <title>125be5d7-91f4-4bd6-90d1-b78faf24b2aa</title>
    <updated>2026-05-05T23:18:56.561253+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "125be5d7-91f4-4bd6-90d1-b78faf24b2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-23284", "type": "seen", "source": "https://t.me/cibsecurity/26297", "content": "\u203c CVE-2020-23284 \u203c\n\nInformation disclosure in aspx pages in MV's IDCE application v1.0 allows an attacker to copy and paste aspx pages in the end of the URL application that connect into the database which reveals internal and sensitive information without logging into the web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T00:33:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/125be5d7-91f4-4bd6-90d1-b78faf24b2aa/export"/>
    <published>2021-07-21T00:33:54+00:00</published>
  </entry>
</feed>
