<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 13:29:25 +0000</lastBuildDate>
    <item>
      <title>4d410375-1252-487c-ad29-3d82bbbd785d</title>
      <link>https://db.gcve.eu/sighting/4d410375-1252-487c-ad29-3d82bbbd785d/export</link>
      <description>{"uuid": "4d410375-1252-487c-ad29-3d82bbbd785d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/cibsecurity/64500", "content": "\u203c CVE-2022-0010 \u203c\n\nInsertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.An attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. This issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:20.000000Z"}</description>
      <content:encoded>{"uuid": "4d410375-1252-487c-ad29-3d82bbbd785d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/cibsecurity/64500", "content": "\u203c CVE-2022-0010 \u203c\n\nInsertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.An attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. This issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4d410375-1252-487c-ad29-3d82bbbd785d/export</guid>
      <pubDate>Mon, 22 May 2023 12:25:20 +0000</pubDate>
    </item>
    <item>
      <title>d29ab819-aa92-43b4-99f4-a34ee89735e8</title>
      <link>https://db.gcve.eu/sighting/d29ab819-aa92-43b4-99f4-a34ee89735e8/export</link>
      <description>{"uuid": "d29ab819-aa92-43b4-99f4-a34ee89735e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-0010\n\ud83d\udd39 Description: Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.\n\n\nAn attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. \n\nThis issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\n\ud83d\udccf Published: 2023-05-22T07:22:51.662Z\n\ud83d\udccf Modified: 2025-01-21T21:43:10.565Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=3BUS221709&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=&amp;amp;Action=Launch&amp;amp;_ga=2.108646530.1437951308.1684739395-1142547495.1678209228", "creation_timestamp": "2025-01-21T22:01:01.000000Z"}</description>
      <content:encoded>{"uuid": "d29ab819-aa92-43b4-99f4-a34ee89735e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0010", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-0010\n\ud83d\udd39 Description: Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.\n\n\nAn attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. \n\nThis issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.\n\n\n\ud83d\udccf Published: 2023-05-22T07:22:51.662Z\n\ud83d\udccf Modified: 2025-01-21T21:43:10.565Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=3BUS221709&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=&amp;amp;Action=Launch&amp;amp;_ga=2.108646530.1437951308.1684739395-1142547495.1678209228", "creation_timestamp": "2025-01-21T22:01:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d29ab819-aa92-43b4-99f4-a34ee89735e8/export</guid>
      <pubDate>Tue, 21 Jan 2025 22:01:01 +0000</pubDate>
    </item>
  </channel>
</rss>
