<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 05:49:44 +0000</lastBuildDate>
    <item>
      <title>d4c3d40c-d9d2-43df-8e73-6ff323560ef8</title>
      <link>https://db.gcve.eu/sighting/d4c3d40c-d9d2-43df-8e73-6ff323560ef8/export</link>
      <description>{"uuid": "d4c3d40c-d9d2-43df-8e73-6ff323560ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5217", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-11T15:04:12.000000Z"}</description>
      <content:encoded>{"uuid": "d4c3d40c-d9d2-43df-8e73-6ff323560ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5217", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-11T15:04:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d4c3d40c-d9d2-43df-8e73-6ff323560ef8/export</guid>
      <pubDate>Thu, 11 Mar 2021 15:04:12 +0000</pubDate>
    </item>
    <item>
      <title>4927da14-24ad-4b8b-8970-7b9a363c462c</title>
      <link>https://db.gcve.eu/sighting/4927da14-24ad-4b8b-8970-7b9a363c462c/export</link>
      <description>{"uuid": "4927da14-24ad-4b8b-8970-7b9a363c462c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5218", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-12T17:04:14.000000Z"}</description>
      <content:encoded>{"uuid": "4927da14-24ad-4b8b-8970-7b9a363c462c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5218", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-12T17:04:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4927da14-24ad-4b8b-8970-7b9a363c462c/export</guid>
      <pubDate>Fri, 12 Mar 2021 17:04:14 +0000</pubDate>
    </item>
    <item>
      <title>dbace35f-1938-4a00-8ca8-bf86f4ffb441</title>
      <link>https://db.gcve.eu/sighting/dbace35f-1938-4a00-8ca8-bf86f4ffb441/export</link>
      <description>{"uuid": "dbace35f-1938-4a00-8ca8-bf86f4ffb441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2925", "content": "#Threat_Research\n1. CVE-2020-29653:\nStealing Froxlor login credentials using dangling markup (PoC)\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup\n\n2. New Mirai Variant Targeting Network Security Devices\nhttps://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities\n]-&amp;gt; PoC for CVE-2020-25506:\nD-Link DNS-320 Firewall RCE Vulnerability\nhttps://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675\n]-&amp;gt; PoC for CVE-2021-22502:\nRCE in Micro Focus Operation Bridge Reporter, ver.10.4\nhttps://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md\n]-&amp;gt; PoC for CVE-2021-27561, CVE-2021-27562:\nYealink Device Mngmnt Pre-Auth \"root\" Level RCE Vuln\nhttps://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce", "creation_timestamp": "2021-03-17T11:01:15.000000Z"}</description>
      <content:encoded>{"uuid": "dbace35f-1938-4a00-8ca8-bf86f4ffb441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2925", "content": "#Threat_Research\n1. CVE-2020-29653:\nStealing Froxlor login credentials using dangling markup (PoC)\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup\n\n2. New Mirai Variant Targeting Network Security Devices\nhttps://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities\n]-&amp;gt; PoC for CVE-2020-25506:\nD-Link DNS-320 Firewall RCE Vulnerability\nhttps://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675\n]-&amp;gt; PoC for CVE-2021-22502:\nRCE in Micro Focus Operation Bridge Reporter, ver.10.4\nhttps://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md\n]-&amp;gt; PoC for CVE-2021-27561, CVE-2021-27562:\nYealink Device Mngmnt Pre-Auth \"root\" Level RCE Vuln\nhttps://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce", "creation_timestamp": "2021-03-17T11:01:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dbace35f-1938-4a00-8ca8-bf86f4ffb441/export</guid>
      <pubDate>Wed, 17 Mar 2021 11:01:15 +0000</pubDate>
    </item>
    <item>
      <title>552c3219-149a-414f-8aef-fefb0064ed0b</title>
      <link>https://db.gcve.eu/sighting/552c3219-149a-414f-8aef-fefb0064ed0b/export</link>
      <description>{"uuid": "552c3219-149a-414f-8aef-fefb0064ed0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "seen", "source": "https://t.me/cibsecurity/40714", "content": "\u203c CVE-2020-29653 \u203c\n\nFroxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T16:23:32.000000Z"}</description>
      <content:encoded>{"uuid": "552c3219-149a-414f-8aef-fefb0064ed0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "seen", "source": "https://t.me/cibsecurity/40714", "content": "\u203c CVE-2020-29653 \u203c\n\nFroxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T16:23:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/552c3219-149a-414f-8aef-fefb0064ed0b/export</guid>
      <pubDate>Wed, 13 Apr 2022 16:23:32 +0000</pubDate>
    </item>
  </channel>
</rss>
