<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 12:30:21 +0000</lastBuildDate>
    <item>
      <title>058dd513-940e-4d7c-bf34-210f31d93625</title>
      <link>https://db.gcve.eu/sighting/058dd513-940e-4d7c-bf34-210f31d93625/export</link>
      <description>{"uuid": "058dd513-940e-4d7c-bf34-210f31d93625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0193", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1737", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0193\n\ud83d\udd39 Description: A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are\u00a0continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions\u00a0or other impacts,\u00a0depending on the user's privileges.\n\ud83d\udccf Published: 2025-01-15T11:05:11.594Z\n\ud83d\udccf Modified: 2025-01-15T11:05:11.594Z\n\ud83d\udd17 References:\n1. https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series", "creation_timestamp": "2025-01-15T12:22:47.000000Z"}</description>
      <content:encoded>{"uuid": "058dd513-940e-4d7c-bf34-210f31d93625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0193", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1737", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0193\n\ud83d\udd39 Description: A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are\u00a0continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions\u00a0or other impacts,\u00a0depending on the user's privileges.\n\ud83d\udccf Published: 2025-01-15T11:05:11.594Z\n\ud83d\udccf Modified: 2025-01-15T11:05:11.594Z\n\ud83d\udd17 References:\n1. https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series", "creation_timestamp": "2025-01-15T12:22:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/058dd513-940e-4d7c-bf34-210f31d93625/export</guid>
      <pubDate>Wed, 15 Jan 2025 12:22:47 +0000</pubDate>
    </item>
    <item>
      <title>57961ee9-0889-4be8-820a-44f603f6753a</title>
      <link>https://db.gcve.eu/sighting/57961ee9-0889-4be8-820a-44f603f6753a/export</link>
      <description>{"uuid": "57961ee9-0889-4be8-820a-44f603f6753a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0193", "type": "seen", "source": "https://t.me/cvedetector/15430", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0193 - MGate XSS Stored login.csangen\", \n  \"Content\": \"CVE ID : CVE-2025-0193 \nPublished : Jan. 15, 2025, 11:15 a.m. | 17\u00a0minutes ago \nDescription : A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are\u00a0continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions\u00a0or other impacts,\u00a0depending on the user's privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T12:36:07.000000Z"}</description>
      <content:encoded>{"uuid": "57961ee9-0889-4be8-820a-44f603f6753a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0193", "type": "seen", "source": "https://t.me/cvedetector/15430", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0193 - MGate XSS Stored login.csangen\", \n  \"Content\": \"CVE ID : CVE-2025-0193 \nPublished : Jan. 15, 2025, 11:15 a.m. | 17\u00a0minutes ago \nDescription : A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are\u00a0continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions\u00a0or other impacts,\u00a0depending on the user's privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T12:36:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57961ee9-0889-4be8-820a-44f603f6753a/export</guid>
      <pubDate>Wed, 15 Jan 2025 12:36:07 +0000</pubDate>
    </item>
  </channel>
</rss>
