<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T00:54:44.298314+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/cb3d73be-da2a-4666-961a-c7f2995a748a/export</id>
    <title>cb3d73be-da2a-4666-961a-c7f2995a748a</title>
    <updated>2026-05-08T00:54:44.665253+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb3d73be-da2a-4666-961a-c7f2995a748a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9000", "type": "seen", "source": "https://t.me/cibsecurity/28149", "content": "\u203c CVE-2020-9000 \u203c\n\nAn issue was discovered in iPortalis iCS 7.1.13.0. Attackers can send a sequence of requests to rapidly cause .NET Input Validation errors. This increases the size of the log file on the remote server until memory is exhausted, therefore consuming the maximum amount of resources (triggering a denial of service condition).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-01T14:35:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb3d73be-da2a-4666-961a-c7f2995a748a/export"/>
    <published>2021-09-01T14:35:58+00:00</published>
  </entry>
</feed>
