<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 18:13:07 +0000</lastBuildDate>
    <item>
      <title>a39af1e8-f81b-4937-90ce-c4ae98b17e01</title>
      <link>https://db.gcve.eu/sighting/a39af1e8-f81b-4937-90ce-c4ae98b17e01/export</link>
      <description>{"uuid": "a39af1e8-f81b-4937-90ce-c4ae98b17e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12013", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997425586155705", "content": "", "creation_timestamp": "2025-02-13T16:04:31.240554Z"}</description>
      <content:encoded>{"uuid": "a39af1e8-f81b-4937-90ce-c4ae98b17e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12013", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113997425586155705", "content": "", "creation_timestamp": "2025-02-13T16:04:31.240554Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a39af1e8-f81b-4937-90ce-c4ae98b17e01/export</guid>
      <pubDate>Thu, 13 Feb 2025 16:04:31 +0000</pubDate>
    </item>
    <item>
      <title>8256d60f-e303-4d59-a0c8-04edf80e1645</title>
      <link>https://db.gcve.eu/sighting/8256d60f-e303-4d59-a0c8-04edf80e1645/export</link>
      <description>{"uuid": "8256d60f-e303-4d59-a0c8-04edf80e1645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12013", "type": "seen", "source": "https://t.me/cvedetector/18037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12013 - Fortinet TCP/IP Gateway Default Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12013 \nPublished : Feb. 13, 2025, 4:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A CWE-1392 \u201cUse of Default Credentials\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The device exposes an FTP server with default and easy-to-guess admin credentials. A remote attacker capable of interacting with the FTP server could gain access and perform changes over resources exposed by the service such as configuration files where password hashes are saved or where network settings are stored. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:45.000000Z"}</description>
      <content:encoded>{"uuid": "8256d60f-e303-4d59-a0c8-04edf80e1645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12013", "type": "seen", "source": "https://t.me/cvedetector/18037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12013 - Fortinet TCP/IP Gateway Default Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12013 \nPublished : Feb. 13, 2025, 4:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A CWE-1392 \u201cUse of Default Credentials\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The device exposes an FTP server with default and easy-to-guess admin credentials. A remote attacker capable of interacting with the FTP server could gain access and perform changes over resources exposed by the service such as configuration files where password hashes are saved or where network settings are stored. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8256d60f-e303-4d59-a0c8-04edf80e1645/export</guid>
      <pubDate>Thu, 13 Feb 2025 18:50:45 +0000</pubDate>
    </item>
  </channel>
</rss>
