<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:11:31 +0000</lastBuildDate>
    <item>
      <title>f94d4f06-2499-4fd4-b787-ed7f56a1c58a</title>
      <link>https://db.gcve.eu/sighting/f94d4f06-2499-4fd4-b787-ed7f56a1c58a/export</link>
      <description>{"uuid": "f94d4f06-2499-4fd4-b787-ed7f56a1c58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-10007", "type": "seen", "source": "https://t.me/cibsecurity/55737", "content": "\u203c CVE-2015-10007 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-02T14:30:51.000000Z"}</description>
      <content:encoded>{"uuid": "f94d4f06-2499-4fd4-b787-ed7f56a1c58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-10007", "type": "seen", "source": "https://t.me/cibsecurity/55737", "content": "\u203c CVE-2015-10007 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-02T14:30:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f94d4f06-2499-4fd4-b787-ed7f56a1c58a/export</guid>
      <pubDate>Mon, 02 Jan 2023 14:30:51 +0000</pubDate>
    </item>
    <item>
      <title>14240360-1d86-4fb0-b827-a021119b13f7</title>
      <link>https://db.gcve.eu/sighting/14240360-1d86-4fb0-b827-a021119b13f7/export</link>
      <description>{"uuid": "14240360-1d86-4fb0-b827-a021119b13f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-10007", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11422", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2015-10007\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2023-01-02T10:32:12.484Z\n\ud83d\udccf Modified: 2025-04-11T13:42:00.372Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.217184\n2. https://vuldb.com/?ctiid.217184\n3. https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4", "creation_timestamp": "2025-04-11T13:51:14.000000Z"}</description>
      <content:encoded>{"uuid": "14240360-1d86-4fb0-b827-a021119b13f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-10007", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11422", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2015-10007\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2023-01-02T10:32:12.484Z\n\ud83d\udccf Modified: 2025-04-11T13:42:00.372Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.217184\n2. https://vuldb.com/?ctiid.217184\n3. https://github.com/82Flex/WEIPDCRM/commit/43bad79392332fa39e31b95268e76fbda9fec3a4", "creation_timestamp": "2025-04-11T13:51:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/14240360-1d86-4fb0-b827-a021119b13f7/export</guid>
      <pubDate>Fri, 11 Apr 2025 13:51:14 +0000</pubDate>
    </item>
  </channel>
</rss>
