<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 04:59:56 +0000</lastBuildDate>
    <item>
      <title>9c5ca95f-b1ea-4d32-a3bc-c01cea7d57ab</title>
      <link>https://db.gcve.eu/sighting/9c5ca95f-b1ea-4d32-a3bc-c01cea7d57ab/export</link>
      <description>{"uuid": "9c5ca95f-b1ea-4d32-a3bc-c01cea7d57ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-2024", "type": "seen", "source": "https://t.me/cibsecurity/5634", "content": "ATENTION\u203c New - CVE-2018-2024\n\nIBM QRadar SIEM 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 155350.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-07-22T18:28:14.000000Z"}</description>
      <content:encoded>{"uuid": "9c5ca95f-b1ea-4d32-a3bc-c01cea7d57ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-2024", "type": "seen", "source": "https://t.me/cibsecurity/5634", "content": "ATENTION\u203c New - CVE-2018-2024\n\nIBM QRadar SIEM 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 155350.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-07-22T18:28:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9c5ca95f-b1ea-4d32-a3bc-c01cea7d57ab/export</guid>
      <pubDate>Mon, 22 Jul 2019 18:28:14 +0000</pubDate>
    </item>
    <item>
      <title>848be7d1-50fb-4f1f-b8b6-9b46ae2b7c80</title>
      <link>https://db.gcve.eu/sighting/848be7d1-50fb-4f1f-b8b6-9b46ae2b7c80/export</link>
      <description>{"uuid": "848be7d1-50fb-4f1f-b8b6-9b46ae2b7c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-20243", "type": "seen", "source": "https://t.me/cibsecurity/15243", "content": "\u203c CVE-2018-20243 \u203c\n\nThe implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-13T22:38:50.000000Z"}</description>
      <content:encoded>{"uuid": "848be7d1-50fb-4f1f-b8b6-9b46ae2b7c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-20243", "type": "seen", "source": "https://t.me/cibsecurity/15243", "content": "\u203c CVE-2018-20243 \u203c\n\nThe implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-13T22:38:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/848be7d1-50fb-4f1f-b8b6-9b46ae2b7c80/export</guid>
      <pubDate>Tue, 13 Oct 2020 22:38:50 +0000</pubDate>
    </item>
  </channel>
</rss>
