<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 00:11:49 +0000</lastBuildDate>
    <item>
      <title>125be5d7-91f4-4bd6-90d1-b78faf24b2aa</title>
      <link>https://db.gcve.eu/sighting/125be5d7-91f4-4bd6-90d1-b78faf24b2aa/export</link>
      <description>{"uuid": "125be5d7-91f4-4bd6-90d1-b78faf24b2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-23284", "type": "seen", "source": "https://t.me/cibsecurity/26297", "content": "\u203c CVE-2020-23284 \u203c\n\nInformation disclosure in aspx pages in MV's IDCE application v1.0 allows an attacker to copy and paste aspx pages in the end of the URL application that connect into the database which reveals internal and sensitive information without logging into the web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T00:33:54.000000Z"}</description>
      <content:encoded>{"uuid": "125be5d7-91f4-4bd6-90d1-b78faf24b2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-23284", "type": "seen", "source": "https://t.me/cibsecurity/26297", "content": "\u203c CVE-2020-23284 \u203c\n\nInformation disclosure in aspx pages in MV's IDCE application v1.0 allows an attacker to copy and paste aspx pages in the end of the URL application that connect into the database which reveals internal and sensitive information without logging into the web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T00:33:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/125be5d7-91f4-4bd6-90d1-b78faf24b2aa/export</guid>
      <pubDate>Wed, 21 Jul 2021 00:33:54 +0000</pubDate>
    </item>
  </channel>
</rss>
