<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:56:12 +0000</lastBuildDate>
    <item>
      <title>62f30a8d-db1b-48c7-99ac-c361e19ae62c</title>
      <link>https://db.gcve.eu/sighting/62f30a8d-db1b-48c7-99ac-c361e19ae62c/export</link>
      <description>{"uuid": "62f30a8d-db1b-48c7-99ac-c361e19ae62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-RXH8-P4V2-M8HF", "type": "seen", "source": "https://t.me/arpsyndicate/2233", "content": "#ExploitObserverAlert\n\nGHSA-rxh8-p4v2-m8hf\n\nDESCRIPTION: Exploit Observer has 1 entries related to GHSA-RXH8-P4V2-M8HF. The improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.\n\nGHSS: 8.8", "creation_timestamp": "2023-12-29T10:17:23.000000Z"}</description>
      <content:encoded>{"uuid": "62f30a8d-db1b-48c7-99ac-c361e19ae62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-RXH8-P4V2-M8HF", "type": "seen", "source": "https://t.me/arpsyndicate/2233", "content": "#ExploitObserverAlert\n\nGHSA-rxh8-p4v2-m8hf\n\nDESCRIPTION: Exploit Observer has 1 entries related to GHSA-RXH8-P4V2-M8HF. The improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.\n\nGHSS: 8.8", "creation_timestamp": "2023-12-29T10:17:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/62f30a8d-db1b-48c7-99ac-c361e19ae62c/export</guid>
      <pubDate>Fri, 29 Dec 2023 10:17:23 +0000</pubDate>
    </item>
  </channel>
</rss>
