<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 04:41:12 +0000</lastBuildDate>
    <item>
      <title>c696429c-cb9c-4b58-929f-187a5423e3a9</title>
      <link>https://db.gcve.eu/sighting/c696429c-cb9c-4b58-929f-187a5423e3a9/export</link>
      <description>{"uuid": "c696429c-cb9c-4b58-929f-187a5423e3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27870", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2696", "content": "#Threat_Research:\n1. CVE-2020-35700:\nExploiting a Second-Order SQL Injection in LibreNMS &amp;lt; 21.1.0 (PoC)\nhttps://www.horizon3.ai/disclosures/librenms-second-order-sqli\n2. CVE-2020-27870:\nDirectory Traversal leading to arbitrary file read\nhttps://www.zerodayinitiative.com/blog/2021/2/11/three-more-bugs-in-orions-belt", "creation_timestamp": "2021-02-13T20:36:37.000000Z"}</description>
      <content:encoded>{"uuid": "c696429c-cb9c-4b58-929f-187a5423e3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27870", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2696", "content": "#Threat_Research:\n1. CVE-2020-35700:\nExploiting a Second-Order SQL Injection in LibreNMS &amp;lt; 21.1.0 (PoC)\nhttps://www.horizon3.ai/disclosures/librenms-second-order-sqli\n2. CVE-2020-27870:\nDirectory Traversal leading to arbitrary file read\nhttps://www.zerodayinitiative.com/blog/2021/2/11/three-more-bugs-in-orions-belt", "creation_timestamp": "2021-02-13T20:36:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c696429c-cb9c-4b58-929f-187a5423e3a9/export</guid>
      <pubDate>Sat, 13 Feb 2021 20:36:37 +0000</pubDate>
    </item>
    <item>
      <title>ec3a87e9-686e-4880-9fc1-8423f7125c79</title>
      <link>https://db.gcve.eu/sighting/ec3a87e9-686e-4880-9fc1-8423f7125c79/export</link>
      <description>{"uuid": "ec3a87e9-686e-4880-9fc1-8423f7125c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27870", "type": "seen", "source": "https://t.me/cibsecurity/23424", "content": "\u203c CVE-2020-27870 \u203c\n\nThis vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability. The specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-17T18:22:56.000000Z"}</description>
      <content:encoded>{"uuid": "ec3a87e9-686e-4880-9fc1-8423f7125c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27870", "type": "seen", "source": "https://t.me/cibsecurity/23424", "content": "\u203c CVE-2020-27870 \u203c\n\nThis vulnerability allows remote attackers to disclose sensitive information on affected installations of SolarWinds Orion Platform 2020.2.1. Authentication is required to exploit this vulnerability. The specific flaw exists within ExportToPDF.aspx. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11917.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-17T18:22:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ec3a87e9-686e-4880-9fc1-8423f7125c79/export</guid>
      <pubDate>Sun, 17 Sep 2023 18:22:56 +0000</pubDate>
    </item>
  </channel>
</rss>
