<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T19:06:13.860381+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/813b1285-c8c7-43ef-a96c-6f7d72240951/export</id>
    <title>813b1285-c8c7-43ef-a96c-6f7d72240951</title>
    <updated>2026-05-03T19:06:14.211653+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "813b1285-c8c7-43ef-a96c-6f7d72240951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/21708", "content": "Critical RCE Bug Affects Millions of OpenWrt-based Network Devices A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic.\n\nTracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the", "creation_timestamp": "2020-03-24T21:35:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/813b1285-c8c7-43ef-a96c-6f7d72240951/export"/>
    <published>2020-03-24T21:35:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/727b7b64-cb0b-42b9-aeed-e9fe782b4967/export</id>
    <title>727b7b64-cb0b-42b9-aeed-e9fe782b4967</title>
    <updated>2026-05-03T19:06:14.211536+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "727b7b64-cb0b-42b9-aeed-e9fe782b4967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/Jum2kdRcpL_6eH0r3t0QHBoLeqQ8wLPgagnwArxT58_IdfU", "content": "", "creation_timestamp": "2020-04-06T19:33:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/727b7b64-cb0b-42b9-aeed-e9fe782b4967/export"/>
    <published>2020-04-06T19:33:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/78c359fe-b95a-4769-a4cd-6eedc9057dee/export</id>
    <title>78c359fe-b95a-4769-a4cd-6eedc9057dee</title>
    <updated>2026-05-03T19:06:14.211419+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "78c359fe-b95a-4769-a4cd-6eedc9057dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/lhJxVJEyxPY7Xl40oJyfm1uyLFRL117rPvuXk2UcjUIGC8Y", "content": "", "creation_timestamp": "2020-04-06T19:33:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/78c359fe-b95a-4769-a4cd-6eedc9057dee/export"/>
    <published>2020-04-06T19:33:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9f62dee1-e659-45f5-8327-2e6a65ef88d8/export</id>
    <title>9f62dee1-e659-45f5-8327-2e6a65ef88d8</title>
    <updated>2026-05-03T19:06:14.211286+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9f62dee1-e659-45f5-8327-2e6a65ef88d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "Telegram/kxlb9TNUj__yuUYhIHd5dBTJpt24zMsQrjrhakHQ1w5TOYA", "content": "", "creation_timestamp": "2020-04-06T19:42:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9f62dee1-e659-45f5-8327-2e6a65ef88d8/export"/>
    <published>2020-04-06T19:42:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/64cfba41-5c62-40f7-aef7-8048b9b38710/export</id>
    <title>64cfba41-5c62-40f7-aef7-8048b9b38710</title>
    <updated>2026-05-03T19:06:14.211003+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "64cfba41-5c62-40f7-aef7-8048b9b38710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/367", "content": "Uncovering OpenWRT remote code execution (CVE-2020-7982)\n\nContinue reading at blog.forallsecure.com (from /r/netsec)", "creation_timestamp": "2020-04-07T14:08:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/64cfba41-5c62-40f7-aef7-8048b9b38710/export"/>
    <published>2020-04-07T14:08:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/197c5064-227e-45c7-93b9-3df6ac89a067/export</id>
    <title>197c5064-227e-45c7-93b9-3df6ac89a067</title>
    <updated>2026-05-03T19:06:14.210867+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "197c5064-227e-45c7-93b9-3df6ac89a067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6359", "content": "UNCOVERING OPENWRT REMOTE CODE EXECUTION (CVE-2020-7982)\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-07T15:29:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/197c5064-227e-45c7-93b9-3df6ac89a067/export"/>
    <published>2020-04-07T15:29:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2d46a61e-16de-431c-b088-ca2dafc4e52f/export</id>
    <title>2d46a61e-16de-431c-b088-ca2dafc4e52f</title>
    <updated>2026-05-03T19:06:14.210687+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2d46a61e-16de-431c-b088-ca2dafc4e52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/282", "content": "https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-13T09:11:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2d46a61e-16de-431c-b088-ca2dafc4e52f/export"/>
    <published>2020-04-13T09:11:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0e15e32f-3c6e-42ca-9fd1-89227d2dddea/export</id>
    <title>0e15e32f-3c6e-42ca-9fd1-89227d2dddea</title>
    <updated>2026-05-03T19:06:14.208798+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0e15e32f-3c6e-42ca-9fd1-89227d2dddea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/847", "content": "#exploit\n1. CVE-2020-7982:\nUncovering OpenWRT 18.06.0 - 18.06.6, 19.07.0, LEDE 17.01.0-17.01.7 - RCE\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982\n\n2. Memcached 1.6.0, 1.6.1:\nRemote DOS attack/0day BoF vulnerability reveal\u00a0\nhttps://github.com/memcached/memcached/issues/629", "creation_timestamp": "2024-10-17T18:26:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0e15e32f-3c6e-42ca-9fd1-89227d2dddea/export"/>
    <published>2024-10-17T18:26:48+00:00</published>
  </entry>
</feed>
