<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T11:36:27.664437+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/789feced-cd3c-418a-b573-8538eb6e241c/export</id>
    <title>789feced-cd3c-418a-b573-8538eb6e241c</title>
    <updated>2026-05-11T11:36:28.187786+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "789feced-cd3c-418a-b573-8538eb6e241c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9420", "type": "seen", "source": "https://t.me/cibsecurity/54493", "content": "\u203c CVE-2020-9420 \u203c\n\nThe login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-14T07:22:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/789feced-cd3c-418a-b573-8538eb6e241c/export"/>
    <published>2022-12-14T07:22:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/afa0288a-ff74-4ad9-91da-d05912eff9c1/export</id>
    <title>afa0288a-ff74-4ad9-91da-d05912eff9c1</title>
    <updated>2026-05-11T11:36:28.176010+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "afa0288a-ff74-4ad9-91da-d05912eff9c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9420", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-9420\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The login password of the web administrative dashboard in Arcadyan Wifi routers VRV9506JAC23 is sent in cleartext, allowing an attacker to sniff and intercept traffic to learn the administrative credentials to the router.\n\ud83d\udccf Published: 2022-12-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T02:45:14.570Z\n\ud83d\udd17 References:\n1. https://gist.github.com/AsherDLL/03d0762b5a535e300f1121caebe333ce", "creation_timestamp": "2025-04-22T03:02:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/afa0288a-ff74-4ad9-91da-d05912eff9c1/export"/>
    <published>2025-04-22T03:02:40+00:00</published>
  </entry>
</feed>
