<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 22:56:39 +0000</lastBuildDate>
    <item>
      <title>1ea55a26-a57b-4748-b4a4-15319b1bdd10</title>
      <link>https://db.gcve.eu/sighting/1ea55a26-a57b-4748-b4a4-15319b1bdd10/export</link>
      <description>{"uuid": "1ea55a26-a57b-4748-b4a4-15319b1bdd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-1000626", "type": "seen", "source": "https://t.me/cibsecurity/1808", "content": "ATENTION\u203c New - CVE-2018-1000626\n\nBattelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the lack of requirement to change the default API key. An attacker could exploit this vulnerability using all available API functions containing an unchanged API key to gain unauthorized access to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2018-12-28T18:22:14.000000Z"}</description>
      <content:encoded>{"uuid": "1ea55a26-a57b-4748-b4a4-15319b1bdd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-1000626", "type": "seen", "source": "https://t.me/cibsecurity/1808", "content": "ATENTION\u203c New - CVE-2018-1000626\n\nBattelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the lack of requirement to change the default API key. An attacker could exploit this vulnerability using all available API functions containing an unchanged API key to gain unauthorized access to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2018-12-28T18:22:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1ea55a26-a57b-4748-b4a4-15319b1bdd10/export</guid>
      <pubDate>Fri, 28 Dec 2018 18:22:14 +0000</pubDate>
    </item>
  </channel>
</rss>
