<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 00:28:19 +0000</lastBuildDate>
    <item>
      <title>efc2dfd8-cc49-432c-9508-d0b8144f3ef1</title>
      <link>https://db.gcve.eu/sighting/efc2dfd8-cc49-432c-9508-d0b8144f3ef1/export</link>
      <description>{"uuid": "efc2dfd8-cc49-432c-9508-d0b8144f3ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "seen", "source": "https://t.me/ctinow/189082", "content": "https://ift.tt/NxEWD2Y\n[GHSA-cp68-qrhr-g9h8] MeshCentral cross-site websocket hijacking (CSWSH) vulnerability", "creation_timestamp": "2024-02-21T01:17:04.000000Z"}</description>
      <content:encoded>{"uuid": "efc2dfd8-cc49-432c-9508-d0b8144f3ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "seen", "source": "https://t.me/ctinow/189082", "content": "https://ift.tt/NxEWD2Y\n[GHSA-cp68-qrhr-g9h8] MeshCentral cross-site websocket hijacking (CSWSH) vulnerability", "creation_timestamp": "2024-02-21T01:17:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/efc2dfd8-cc49-432c-9508-d0b8144f3ef1/export</guid>
      <pubDate>Wed, 21 Feb 2024 01:17:04 +0000</pubDate>
    </item>
    <item>
      <title>49bbc2d7-48c4-4d6b-ad79-832ddfda768a</title>
      <link>https://db.gcve.eu/sighting/49bbc2d7-48c4-4d6b-ad79-832ddfda768a/export</link>
      <description>{"uuid": "49bbc2d7-48c4-4d6b-ad79-832ddfda768a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "seen", "source": "https://t.me/arpsyndicate/3859", "content": "#ExploitObserverAlert\n\nGHSA-cp68-qrhr-g9h8\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to GHSA-cp68-qrhr-g9h8. MeshCentral cross-site websocket hijacking (CSWSH) vulnerability", "creation_timestamp": "2024-02-21T21:09:54.000000Z"}</description>
      <content:encoded>{"uuid": "49bbc2d7-48c4-4d6b-ad79-832ddfda768a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "seen", "source": "https://t.me/arpsyndicate/3859", "content": "#ExploitObserverAlert\n\nGHSA-cp68-qrhr-g9h8\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to GHSA-cp68-qrhr-g9h8. MeshCentral cross-site websocket hijacking (CSWSH) vulnerability", "creation_timestamp": "2024-02-21T21:09:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/49bbc2d7-48c4-4d6b-ad79-832ddfda768a/export</guid>
      <pubDate>Wed, 21 Feb 2024 21:09:54 +0000</pubDate>
    </item>
    <item>
      <title>80dbe222-89ef-4446-8712-9b6aa4489e42</title>
      <link>https://db.gcve.eu/sighting/80dbe222-89ef-4446-8712-9b6aa4489e42/export</link>
      <description>{"uuid": "80dbe222-89ef-4446-8712-9b6aa4489e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12897", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26135\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.\n\ud83d\udccf Published: 2024-02-20T19:50:30.723Z\n\ud83d\udccf Modified: 2025-04-22T16:26:34.189Z\n\ud83d\udd17 References:\n1. https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8\n2. https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3", "creation_timestamp": "2025-04-22T17:03:16.000000Z"}</description>
      <content:encoded>{"uuid": "80dbe222-89ef-4446-8712-9b6aa4489e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CP68-QRHR-G9H8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12897", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26135\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.\n\ud83d\udccf Published: 2024-02-20T19:50:30.723Z\n\ud83d\udccf Modified: 2025-04-22T16:26:34.189Z\n\ud83d\udd17 References:\n1. https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8\n2. https://github.com/Ylianst/MeshCentral/commit/f2e43cc6da9f5447dbff0948e6c6024c8a315af3", "creation_timestamp": "2025-04-22T17:03:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/80dbe222-89ef-4446-8712-9b6aa4489e42/export</guid>
      <pubDate>Tue, 22 Apr 2025 17:03:16 +0000</pubDate>
    </item>
  </channel>
</rss>
