<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 12:51:19 +0000</lastBuildDate>
    <item>
      <title>83c00518-ade5-41b2-a54d-3ce5e7cf9e20</title>
      <link>https://db.gcve.eu/sighting/83c00518-ade5-41b2-a54d-3ce5e7cf9e20/export</link>
      <description>{"uuid": "83c00518-ade5-41b2-a54d-3ce5e7cf9e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33603", "type": "seen", "source": "https://t.me/cvedetector/9428", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33603 - LevelOne WBR-6012 Router Information Disclosure and Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33603 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router has an information disclosure vulnerability in its web application, which allows unauthenticated users to access a verbose system log page and obtain sensitive data, such as memory addresses and IP addresses for login attempts. This flaw could lead to session hijacking due to the device's reliance on IP address for authentication. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:51:59.000000Z"}</description>
      <content:encoded>{"uuid": "83c00518-ade5-41b2-a54d-3ce5e7cf9e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33603", "type": "seen", "source": "https://t.me/cvedetector/9428", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33603 - LevelOne WBR-6012 Router Information Disclosure and Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33603 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router has an information disclosure vulnerability in its web application, which allows unauthenticated users to access a verbose system log page and obtain sensitive data, such as memory addresses and IP addresses for login attempts. This flaw could lead to session hijacking due to the device's reliance on IP address for authentication. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:51:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/83c00518-ade5-41b2-a54d-3ce5e7cf9e20/export</guid>
      <pubDate>Wed, 30 Oct 2024 15:51:59 +0000</pubDate>
    </item>
  </channel>
</rss>
