<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T07:30:41.035427+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d4c3d40c-d9d2-43df-8e73-6ff323560ef8/export</id>
    <title>d4c3d40c-d9d2-43df-8e73-6ff323560ef8</title>
    <updated>2026-05-03T07:30:41.359362+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d4c3d40c-d9d2-43df-8e73-6ff323560ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5217", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-11T15:04:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d4c3d40c-d9d2-43df-8e73-6ff323560ef8/export"/>
    <published>2021-03-11T15:04:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4927da14-24ad-4b8b-8970-7b9a363c462c/export</id>
    <title>4927da14-24ad-4b8b-8970-7b9a363c462c</title>
    <updated>2026-05-03T07:30:41.359126+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4927da14-24ad-4b8b-8970-7b9a363c462c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5218", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-12T17:04:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4927da14-24ad-4b8b-8970-7b9a363c462c/export"/>
    <published>2021-03-12T17:04:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dbace35f-1938-4a00-8ca8-bf86f4ffb441/export</id>
    <title>dbace35f-1938-4a00-8ca8-bf86f4ffb441</title>
    <updated>2026-05-03T07:30:41.358822+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dbace35f-1938-4a00-8ca8-bf86f4ffb441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2925", "content": "#Threat_Research\n1. CVE-2020-29653:\nStealing Froxlor login credentials using dangling markup (PoC)\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup\n\n2. New Mirai Variant Targeting Network Security Devices\nhttps://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities\n]-&amp;gt; PoC for CVE-2020-25506:\nD-Link DNS-320 Firewall RCE Vulnerability\nhttps://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675\n]-&amp;gt; PoC for CVE-2021-22502:\nRCE in Micro Focus Operation Bridge Reporter, ver.10.4\nhttps://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md\n]-&amp;gt; PoC for CVE-2021-27561, CVE-2021-27562:\nYealink Device Mngmnt Pre-Auth \"root\" Level RCE Vuln\nhttps://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce", "creation_timestamp": "2021-03-17T11:01:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dbace35f-1938-4a00-8ca8-bf86f4ffb441/export"/>
    <published>2021-03-17T11:01:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/552c3219-149a-414f-8aef-fefb0064ed0b/export</id>
    <title>552c3219-149a-414f-8aef-fefb0064ed0b</title>
    <updated>2026-05-03T07:30:41.356500+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "552c3219-149a-414f-8aef-fefb0064ed0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "seen", "source": "https://t.me/cibsecurity/40714", "content": "\u203c CVE-2020-29653 \u203c\n\nFroxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T16:23:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/552c3219-149a-414f-8aef-fefb0064ed0b/export"/>
    <published>2022-04-13T16:23:32+00:00</published>
  </entry>
</feed>
