<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T15:23:33.618990+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4d410375-1252-487c-ad29-3d82bbbd785d/export</id>
    <title>4d410375-1252-487c-ad29-3d82bbbd785d</title>
    <updated>2026-05-02T15:23:33.969712+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d410375-1252-487c-ad29-3d82bbbd785d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/cibsecurity/64500", "content": "\u203c CVE-2022-0010 \u203c\n\nInsertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.An attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. This issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d410375-1252-487c-ad29-3d82bbbd785d/export"/>
    <published>2023-05-22T12:25:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d29ab819-aa92-43b4-99f4-a34ee89735e8/export</id>
    <title>d29ab819-aa92-43b4-99f4-a34ee89735e8</title>
    <updated>2026-05-02T15:23:33.967359+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d29ab819-aa92-43b4-99f4-a34ee89735e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-0010\n\ud83d\udd39 Description: Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.\n\n\nAn attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. \n\nThis issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\n\ud83d\udccf Published: 2023-05-22T07:22:51.662Z\n\ud83d\udccf Modified: 2025-01-21T21:43:10.565Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=3BUS221709&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=&amp;amp;Action=Launch&amp;amp;_ga=2.108646530.1437951308.1684739395-1142547495.1678209228", "creation_timestamp": "2025-01-21T22:01:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d29ab819-aa92-43b4-99f4-a34ee89735e8/export"/>
    <published>2025-01-21T22:01:01+00:00</published>
  </entry>
</feed>
