<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 09:15:50 +0000</lastBuildDate>
    <item>
      <title>a9249d32-5270-43d6-b2c6-0234df8921f0</title>
      <link>https://db.gcve.eu/sighting/a9249d32-5270-43d6-b2c6-0234df8921f0/export</link>
      <description>{"uuid": "a9249d32-5270-43d6-b2c6-0234df8921f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-8298", "type": "seen", "source": "https://t.me/cibsecurity/344", "content": "ATENTION\u203c New - CVE-2015-8298\n\nMultiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2018-09-24T22:33:29.000000Z"}</description>
      <content:encoded>{"uuid": "a9249d32-5270-43d6-b2c6-0234df8921f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-8298", "type": "seen", "source": "https://t.me/cibsecurity/344", "content": "ATENTION\u203c New - CVE-2015-8298\n\nMultiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2018-09-24T22:33:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a9249d32-5270-43d6-b2c6-0234df8921f0/export</guid>
      <pubDate>Mon, 24 Sep 2018 22:33:29 +0000</pubDate>
    </item>
  </channel>
</rss>
