<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 23:38:20 +0000</lastBuildDate>
    <item>
      <title>ac71998e-780a-476e-bc45-cd2749de053d</title>
      <link>https://db.gcve.eu/sighting/ac71998e-780a-476e-bc45-cd2749de053d/export</link>
      <description>{"uuid": "ac71998e-780a-476e-bc45-cd2749de053d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "published-proof-of-concept", "source": "https://t.me/antichat/6903", "content": "\u200b\u200b\u0422\u0430\u043c \u043d\u0430 \u043c\u0438\u043a\u0440\u043e\u0442\u0438\u043a\u0438 \u043f\u0440\u0438\u043b\u0435\u0442\u0435\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 RouterOS 6.45.7, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0441\u0440\u0430\u0437\u0443 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n\n!) package \u2014 accept only packages with original filenames (CVE-2019-3976);\n!) package \u2014 improved package signature verification (CVE-2019-3977);\n!) security \u2014 fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0415\u0441\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0442\u043e\u0440\u0447\u0430\u0449\u0438\u0439 \u043d\u0430\u0440\u0443\u0436\u0443 Winbox, \u043b\u0438\u0441\u0442\u0430\u0439\u0442\u0435 \u0434\u0430\u043b\u044c\u0448\u0435, \u0432\u0430\u043c \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u0447\u0442\u043e-\u0442\u043e \u043f\u043e\u043c\u043e\u0436\u0435\u0442, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0436\u0435 \u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\n\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043f\u0440\u043e DNS cache poisoning:\n[EN] https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21\n[RU] https://habr.com/ru/post/473676/\n\n\u041f\u0440\u043e \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 2 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n[EN] https://blog.mikrotik.com/security/package-validation-and-upgrade-vulnerability.html", "creation_timestamp": "2019-10-29T18:57:45.000000Z"}</description>
      <content:encoded>{"uuid": "ac71998e-780a-476e-bc45-cd2749de053d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "published-proof-of-concept", "source": "https://t.me/antichat/6903", "content": "\u200b\u200b\u0422\u0430\u043c \u043d\u0430 \u043c\u0438\u043a\u0440\u043e\u0442\u0438\u043a\u0438 \u043f\u0440\u0438\u043b\u0435\u0442\u0435\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 RouterOS 6.45.7, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0441\u0440\u0430\u0437\u0443 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n\n!) package \u2014 accept only packages with original filenames (CVE-2019-3976);\n!) package \u2014 improved package signature verification (CVE-2019-3977);\n!) security \u2014 fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0415\u0441\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0442\u043e\u0440\u0447\u0430\u0449\u0438\u0439 \u043d\u0430\u0440\u0443\u0436\u0443 Winbox, \u043b\u0438\u0441\u0442\u0430\u0439\u0442\u0435 \u0434\u0430\u043b\u044c\u0448\u0435, \u0432\u0430\u043c \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u0447\u0442\u043e-\u0442\u043e \u043f\u043e\u043c\u043e\u0436\u0435\u0442, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0436\u0435 \u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\n\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043f\u0440\u043e DNS cache poisoning:\n[EN] https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21\n[RU] https://habr.com/ru/post/473676/\n\n\u041f\u0440\u043e \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 2 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n[EN] https://blog.mikrotik.com/security/package-validation-and-upgrade-vulnerability.html", "creation_timestamp": "2019-10-29T18:57:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ac71998e-780a-476e-bc45-cd2749de053d/export</guid>
      <pubDate>Tue, 29 Oct 2019 18:57:45 +0000</pubDate>
    </item>
    <item>
      <title>972887d1-6255-4e0d-80ed-30ec53e24370</title>
      <link>https://db.gcve.eu/sighting/972887d1-6255-4e0d-80ed-30ec53e24370/export</link>
      <description>{"uuid": "972887d1-6255-4e0d-80ed-30ec53e24370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/608", "content": "\u200b\u200b\u0422\u0430\u043c \u043d\u0430 \u043c\u0438\u043a\u0440\u043e\u0442\u0438\u043a\u0438 \u043f\u0440\u0438\u043b\u0435\u0442\u0435\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 RouterOS 6.45.7, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0441\u0440\u0430\u0437\u0443 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n\n!) package \u2014 accept only packages with original filenames (CVE-2019-3976);\n!) package \u2014 improved package signature verification (CVE-2019-3977);\n!) security \u2014 fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0415\u0441\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0442\u043e\u0440\u0447\u0430\u0449\u0438\u0439 \u043d\u0430\u0440\u0443\u0436\u0443 Winbox, \u043b\u0438\u0441\u0442\u0430\u0439\u0442\u0435 \u0434\u0430\u043b\u044c\u0448\u0435, \u0432\u0430\u043c \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u0447\u0442\u043e-\u0442\u043e \u043f\u043e\u043c\u043e\u0436\u0435\u0442, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0436\u0435 \u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\n\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043f\u0440\u043e DNS cache poisoning:\n[EN] https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21\n[RU] https://habr.com/ru/post/473676/\n\n\u041f\u0440\u043e \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 2 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n[EN] https://blog.mikrotik.com/security/package-validation-and-upgrade-vulnerability.html", "creation_timestamp": "2019-10-29T19:57:25.000000Z"}</description>
      <content:encoded>{"uuid": "972887d1-6255-4e0d-80ed-30ec53e24370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/608", "content": "\u200b\u200b\u0422\u0430\u043c \u043d\u0430 \u043c\u0438\u043a\u0440\u043e\u0442\u0438\u043a\u0438 \u043f\u0440\u0438\u043b\u0435\u0442\u0435\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 RouterOS 6.45.7, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0441\u0440\u0430\u0437\u0443 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n\n!) package \u2014 accept only packages with original filenames (CVE-2019-3976);\n!) package \u2014 improved package signature verification (CVE-2019-3977);\n!) security \u2014 fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0415\u0441\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0442\u043e\u0440\u0447\u0430\u0449\u0438\u0439 \u043d\u0430\u0440\u0443\u0436\u0443 Winbox, \u043b\u0438\u0441\u0442\u0430\u0439\u0442\u0435 \u0434\u0430\u043b\u044c\u0448\u0435, \u0432\u0430\u043c \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u0447\u0442\u043e-\u0442\u043e \u043f\u043e\u043c\u043e\u0436\u0435\u0442, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0436\u0435 \u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\n\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043f\u0440\u043e DNS cache poisoning:\n[EN] https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21\n[RU] https://habr.com/ru/post/473676/\n\n\u041f\u0440\u043e \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 2 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\n[EN] https://blog.mikrotik.com/security/package-validation-and-upgrade-vulnerability.html", "creation_timestamp": "2019-10-29T19:57:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/972887d1-6255-4e0d-80ed-30ec53e24370/export</guid>
      <pubDate>Tue, 29 Oct 2019 19:57:25 +0000</pubDate>
    </item>
    <item>
      <title>8c25255b-8b8c-4266-bb70-ea99048c5171</title>
      <link>https://db.gcve.eu/sighting/8c25255b-8b8c-4266-bb70-ea99048c5171/export</link>
      <description>{"uuid": "8c25255b-8b8c-4266-bb70-ea99048c5171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/dtpnk/368", "content": "\u041a\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442\u0435 \u0441\u0432\u043e\u0433\u043e \u043a\u0440\u043e\u0442\u0438\u043a\u0430-\u043d\u0435\u043a\u0440\u043e\u0442\u0438\u043a\u0430? \u0421\u0435\u0439\u0447\u0430\u0441 \u0441\u0430\u043c\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e 6.44.6 (long term) \u0438\u043b\u0438 6.45.7 (stable), \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0432\u0430\u0448\u0438\u0445 \u043f\u0440\u0435\u0434\u043f\u043e\u0447\u0442\u0435\u043d\u0438\u0439. \u041e\u0431\u043d\u043e\u0432\u0430 \u043b\u0430\u0442\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0434\u044b\u0440\u044b:\n\n!) package - accept only packages with original filenames (CVE-2019-3976);\n!) package - improved package signature verification (CVE-2019-3977);\n!) security - fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0417\u0430\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0447\u0442\u0435\u043d\u0438\u0435 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u0438\u0432\u043d\u0438\u043a\u0430 \u0442\u0443\u0442,  \u0430 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u043f\u0440\u0435\u0432\u043e\u0437\u043c\u043e\u0433\u0430\u043d\u0438\u044f \u0437\u0434\u0435\u0441\u044c. \n\u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435\u0441\u044c \u0447\u0430\u0449\u0435 \u0438 \u043d\u0435 \u0441\u0432\u0435\u0442\u0438\u0442\u0435 \u0441\u0432\u043e\u0438\u043c \u0432\u0438\u043d\u0431\u043e\u043a\u0441\u043e\u043c \u0432 \u043f\u043e\u0434\u0432\u043e\u0440\u043e\u0442\u043d\u044f\u0445 \ud83e\udd13 #mikrotik #vulnerability #fix", "creation_timestamp": "2019-10-30T01:40:05.000000Z"}</description>
      <content:encoded>{"uuid": "8c25255b-8b8c-4266-bb70-ea99048c5171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/dtpnk/368", "content": "\u041a\u0430\u043a \u0447\u0430\u0441\u0442\u043e \u0432\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442\u0435 \u0441\u0432\u043e\u0433\u043e \u043a\u0440\u043e\u0442\u0438\u043a\u0430-\u043d\u0435\u043a\u0440\u043e\u0442\u0438\u043a\u0430? \u0421\u0435\u0439\u0447\u0430\u0441 \u0441\u0430\u043c\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e 6.44.6 (long term) \u0438\u043b\u0438 6.45.7 (stable), \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0432\u0430\u0448\u0438\u0445 \u043f\u0440\u0435\u0434\u043f\u043e\u0447\u0442\u0435\u043d\u0438\u0439. \u041e\u0431\u043d\u043e\u0432\u0430 \u043b\u0430\u0442\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0434\u044b\u0440\u044b:\n\n!) package - accept only packages with original filenames (CVE-2019-3976);\n!) package - improved package signature verification (CVE-2019-3977);\n!) security - fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);\n\n\u0417\u0430\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0447\u0442\u0435\u043d\u0438\u0435 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u0438\u0432\u043d\u0438\u043a\u0430 \u0442\u0443\u0442,  \u0430 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u043f\u0440\u0435\u0432\u043e\u0437\u043c\u043e\u0433\u0430\u043d\u0438\u044f \u0437\u0434\u0435\u0441\u044c. \n\u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435\u0441\u044c \u0447\u0430\u0449\u0435 \u0438 \u043d\u0435 \u0441\u0432\u0435\u0442\u0438\u0442\u0435 \u0441\u0432\u043e\u0438\u043c \u0432\u0438\u043d\u0431\u043e\u043a\u0441\u043e\u043c \u0432 \u043f\u043e\u0434\u0432\u043e\u0440\u043e\u0442\u043d\u044f\u0445 \ud83e\udd13 #mikrotik #vulnerability #fix", "creation_timestamp": "2019-10-30T01:40:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8c25255b-8b8c-4266-bb70-ea99048c5171/export</guid>
      <pubDate>Wed, 30 Oct 2019 01:40:05 +0000</pubDate>
    </item>
    <item>
      <title>342e33c8-979c-47eb-a7c8-58b3db2bb76b</title>
      <link>https://db.gcve.eu/sighting/342e33c8-979c-47eb-a7c8-58b3db2bb76b/export</link>
      <description>{"uuid": "342e33c8-979c-47eb-a7c8-58b3db2bb76b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/SecLabNews/6111", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Tenable \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2019-3976, CVE-2019-3977, CVE-2019-3978 \u0438 CVE-2019-3979) \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 MikroTik. \u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432, \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043f\u043e\u0440\u0442\u0443 8291 \u043d\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0435 \u043c\u043e\u0436\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u0430\u0442\u0438\u0442\u044c \u041e\u0421 RouterOS \u0434\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0441\u0431\u0440\u043e\u0441\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.    \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 MikroTik \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0431\u044d\u043a\u0434\u043e\u0440", "creation_timestamp": "2019-10-30T10:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "342e33c8-979c-47eb-a7c8-58b3db2bb76b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/SecLabNews/6111", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Tenable \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2019-3976, CVE-2019-3977, CVE-2019-3978 \u0438 CVE-2019-3979) \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 MikroTik. \u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432, \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043f\u043e\u0440\u0442\u0443 8291 \u043d\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0435 \u043c\u043e\u0436\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u0430\u0442\u0438\u0442\u044c \u041e\u0421 RouterOS \u0434\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0441\u0431\u0440\u043e\u0441\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.    \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 MikroTik \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0431\u044d\u043a\u0434\u043e\u0440", "creation_timestamp": "2019-10-30T10:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/342e33c8-979c-47eb-a7c8-58b3db2bb76b/export</guid>
      <pubDate>Wed, 30 Oct 2019 10:21:42 +0000</pubDate>
    </item>
    <item>
      <title>98f8a130-5294-4263-97bb-9175fb7015fe</title>
      <link>https://db.gcve.eu/sighting/98f8a130-5294-4263-97bb-9175fb7015fe/export</link>
      <description>{"uuid": "98f8a130-5294-4263-97bb-9175fb7015fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "Telegram/bVS7V7lt8_qPP_4-4wtzq8TgsEE8YuhAexu7o8jqr-auJpk", "content": "", "creation_timestamp": "2019-11-18T01:34:57.000000Z"}</description>
      <content:encoded>{"uuid": "98f8a130-5294-4263-97bb-9175fb7015fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "Telegram/bVS7V7lt8_qPP_4-4wtzq8TgsEE8YuhAexu7o8jqr-auJpk", "content": "", "creation_timestamp": "2019-11-18T01:34:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/98f8a130-5294-4263-97bb-9175fb7015fe/export</guid>
      <pubDate>Mon, 18 Nov 2019 01:34:57 +0000</pubDate>
    </item>
    <item>
      <title>f9739f69-acde-4037-a2f7-6c85d9efe88b</title>
      <link>https://db.gcve.eu/sighting/f9739f69-acde-4037-a2f7-6c85d9efe88b/export</link>
      <description>{"uuid": "f9739f69-acde-4037-a2f7-6c85d9efe88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/MikroTik_Books/126", "content": "What's new in 6.46 (2019-Dec-02 11:16):\n\nMAJOR CHANGES IN v6.46:\n----------------------\n!) lora - added support for LoRaWAN low-power wide-area network technology for MIPSBE, MMIPS and ARM;\n!) package - accept only packages with original filenames (CVE-2019-3976);\n!) package - improved package signature verification (CVE-2019-3977);\n!) security - fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979).\nhttps://mikrotik.com/download/changelogs", "creation_timestamp": "2019-12-04T08:11:30.000000Z"}</description>
      <content:encoded>{"uuid": "f9739f69-acde-4037-a2f7-6c85d9efe88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/MikroTik_Books/126", "content": "What's new in 6.46 (2019-Dec-02 11:16):\n\nMAJOR CHANGES IN v6.46:\n----------------------\n!) lora - added support for LoRaWAN low-power wide-area network technology for MIPSBE, MMIPS and ARM;\n!) package - accept only packages with original filenames (CVE-2019-3976);\n!) package - improved package signature verification (CVE-2019-3977);\n!) security - fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979).\nhttps://mikrotik.com/download/changelogs", "creation_timestamp": "2019-12-04T08:11:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f9739f69-acde-4037-a2f7-6c85d9efe88b/export</guid>
      <pubDate>Wed, 04 Dec 2019 08:11:30 +0000</pubDate>
    </item>
    <item>
      <title>41da234c-0e98-4848-8bea-65848ed316f7</title>
      <link>https://db.gcve.eu/sighting/41da234c-0e98-4848-8bea-65848ed316f7/export</link>
      <description>{"uuid": "41da234c-0e98-4848-8bea-65848ed316f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "Telegram/HCu2EcVYcCq-Rd5Jae-hegzvHDn_pfQsfleV3IUWijJdZmg", "content": "", "creation_timestamp": "2019-12-18T11:29:16.000000Z"}</description>
      <content:encoded>{"uuid": "41da234c-0e98-4848-8bea-65848ed316f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "Telegram/HCu2EcVYcCq-Rd5Jae-hegzvHDn_pfQsfleV3IUWijJdZmg", "content": "", "creation_timestamp": "2019-12-18T11:29:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/41da234c-0e98-4848-8bea-65848ed316f7/export</guid>
      <pubDate>Wed, 18 Dec 2019 11:29:16 +0000</pubDate>
    </item>
    <item>
      <title>58d040f9-78da-4be1-ba13-4dfb8bf17276</title>
      <link>https://db.gcve.eu/sighting/58d040f9-78da-4be1-ba13-4dfb8bf17276/export</link>
      <description>{"uuid": "58d040f9-78da-4be1-ba13-4dfb8bf17276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/ctinow/175433", "content": "https://ift.tt/tipXyj8\nCVE-2019-3976 | RouterOS up to 6.44.5/6.45.6 Upgrade Package name input validation", "creation_timestamp": "2024-01-29T18:16:09.000000Z"}</description>
      <content:encoded>{"uuid": "58d040f9-78da-4be1-ba13-4dfb8bf17276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-3976", "type": "seen", "source": "https://t.me/ctinow/175433", "content": "https://ift.tt/tipXyj8\nCVE-2019-3976 | RouterOS up to 6.44.5/6.45.6 Upgrade Package name input validation", "creation_timestamp": "2024-01-29T18:16:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/58d040f9-78da-4be1-ba13-4dfb8bf17276/export</guid>
      <pubDate>Mon, 29 Jan 2024 18:16:09 +0000</pubDate>
    </item>
  </channel>
</rss>
