<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 12:51:46 +0000</lastBuildDate>
    <item>
      <title>cd41218e-460c-49ef-96e3-58facd04eb5c</title>
      <link>https://db.gcve.eu/sighting/cd41218e-460c-49ef-96e3-58facd04eb5c/export</link>
      <description>{"uuid": "cd41218e-460c-49ef-96e3-58facd04eb5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17811", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T17:25:20.000000Z"}</description>
      <content:encoded>{"uuid": "cd41218e-460c-49ef-96e3-58facd04eb5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17811", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T17:25:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cd41218e-460c-49ef-96e3-58facd04eb5c/export</guid>
      <pubDate>Wed, 09 Dec 2020 17:25:20 +0000</pubDate>
    </item>
    <item>
      <title>bc594023-cac6-48f4-9c2c-7f76313bc03c</title>
      <link>https://db.gcve.eu/sighting/bc594023-cac6-48f4-9c2c-7f76313bc03c/export</link>
      <description>{"uuid": "bc594023-cac6-48f4-9c2c-7f76313bc03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17830", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:02:12.000000Z"}</description>
      <content:encoded>{"uuid": "bc594023-cac6-48f4-9c2c-7f76313bc03c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17830", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:02:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bc594023-cac6-48f4-9c2c-7f76313bc03c/export</guid>
      <pubDate>Wed, 09 Dec 2020 18:02:12 +0000</pubDate>
    </item>
    <item>
      <title>874a5d15-c475-40aa-b20e-3ba8372c31d7</title>
      <link>https://db.gcve.eu/sighting/874a5d15-c475-40aa-b20e-3ba8372c31d7/export</link>
      <description>{"uuid": "874a5d15-c475-40aa-b20e-3ba8372c31d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17849", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:05:14.000000Z"}</description>
      <content:encoded>{"uuid": "874a5d15-c475-40aa-b20e-3ba8372c31d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17849", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:05:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/874a5d15-c475-40aa-b20e-3ba8372c31d7/export</guid>
      <pubDate>Wed, 09 Dec 2020 18:05:14 +0000</pubDate>
    </item>
    <item>
      <title>d014ddbc-7a85-42f6-a541-46dce341b462</title>
      <link>https://db.gcve.eu/sighting/d014ddbc-7a85-42f6-a541-46dce341b462/export</link>
      <description>{"uuid": "d014ddbc-7a85-42f6-a541-46dce341b462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17869", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:25:07.000000Z"}</description>
      <content:encoded>{"uuid": "d014ddbc-7a85-42f6-a541-46dce341b462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17869", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:25:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d014ddbc-7a85-42f6-a541-46dce341b462/export</guid>
      <pubDate>Wed, 09 Dec 2020 18:25:07 +0000</pubDate>
    </item>
    <item>
      <title>c1236e13-fb59-4929-94f3-b486f73fe117</title>
      <link>https://db.gcve.eu/sighting/c1236e13-fb59-4929-94f3-b486f73fe117/export</link>
      <description>{"uuid": "c1236e13-fb59-4929-94f3-b486f73fe117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17888", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:32:26.000000Z"}</description>
      <content:encoded>{"uuid": "c1236e13-fb59-4929-94f3-b486f73fe117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17888", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:32:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c1236e13-fb59-4929-94f3-b486f73fe117/export</guid>
      <pubDate>Wed, 09 Dec 2020 18:32:26 +0000</pubDate>
    </item>
    <item>
      <title>0053ec15-4ab4-4dc9-bed6-411b9160a9dc</title>
      <link>https://db.gcve.eu/sighting/0053ec15-4ab4-4dc9-bed6-411b9160a9dc/export</link>
      <description>{"uuid": "0053ec15-4ab4-4dc9-bed6-411b9160a9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17908", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T19:25:14.000000Z"}</description>
      <content:encoded>{"uuid": "0053ec15-4ab4-4dc9-bed6-411b9160a9dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17908", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T19:25:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0053ec15-4ab4-4dc9-bed6-411b9160a9dc/export</guid>
      <pubDate>Wed, 09 Dec 2020 19:25:14 +0000</pubDate>
    </item>
    <item>
      <title>ef711a9a-70ed-4dc2-bc94-c09e41ff4452</title>
      <link>https://db.gcve.eu/sighting/ef711a9a-70ed-4dc2-bc94-c09e41ff4452/export</link>
      <description>{"uuid": "ef711a9a-70ed-4dc2-bc94-c09e41ff4452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17927", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T19:33:41.000000Z"}</description>
      <content:encoded>{"uuid": "ef711a9a-70ed-4dc2-bc94-c09e41ff4452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16128", "type": "seen", "source": "https://t.me/cibsecurity/17927", "content": "\u203c CVE-2020-16128 \u203c\n\nThe aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T19:33:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ef711a9a-70ed-4dc2-bc94-c09e41ff4452/export</guid>
      <pubDate>Wed, 09 Dec 2020 19:33:41 +0000</pubDate>
    </item>
    <item>
      <title>c1de1a88-2f52-49ce-975b-571f80310870</title>
      <link>https://db.gcve.eu/sighting/c1de1a88-2f52-49ce-975b-571f80310870/export</link>
      <description>{"uuid": "c1de1a88-2f52-49ce-975b-571f80310870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16125", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2077", "content": "#Threat_Research\n1. WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques\nhttps://www.fireeye.com/blog/threat-research/2020/11/wow64-subsystem-internals-and-hooking-techniques.html\n2. LPE in Ubuntu gdm3 (CVE-2020-16125)\nhttps://securitylab.github.com/advisories/GHSL-2020-202-gdm3-LPE-unresponsive-accounts-daemon", "creation_timestamp": "2022-07-06T05:33:33.000000Z"}</description>
      <content:encoded>{"uuid": "c1de1a88-2f52-49ce-975b-571f80310870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16125", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2077", "content": "#Threat_Research\n1. WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques\nhttps://www.fireeye.com/blog/threat-research/2020/11/wow64-subsystem-internals-and-hooking-techniques.html\n2. LPE in Ubuntu gdm3 (CVE-2020-16125)\nhttps://securitylab.github.com/advisories/GHSL-2020-202-gdm3-LPE-unresponsive-accounts-daemon", "creation_timestamp": "2022-07-06T05:33:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c1de1a88-2f52-49ce-975b-571f80310870/export</guid>
      <pubDate>Wed, 06 Jul 2022 05:33:33 +0000</pubDate>
    </item>
    <item>
      <title>7e0b7202-4ce2-4ad5-a59c-6c3624d0c7da</title>
      <link>https://db.gcve.eu/sighting/7e0b7202-4ce2-4ad5-a59c-6c3624d0c7da/export</link>
      <description>{"uuid": "7e0b7202-4ce2-4ad5-a59c-6c3624d0c7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2020-1612", "type": "seen", "source": "https://gist.github.com/okfull/f7286f6cee1de1888e21dfc6de914ebc", "content": "", "creation_timestamp": "2025-02-15T04:06:07.000000Z"}</description>
      <content:encoded>{"uuid": "7e0b7202-4ce2-4ad5-a59c-6c3624d0c7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2020-1612", "type": "seen", "source": "https://gist.github.com/okfull/f7286f6cee1de1888e21dfc6de914ebc", "content": "", "creation_timestamp": "2025-02-15T04:06:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e0b7202-4ce2-4ad5-a59c-6c3624d0c7da/export</guid>
      <pubDate>Sat, 15 Feb 2025 04:06:07 +0000</pubDate>
    </item>
    <item>
      <title>41696df4-7654-4164-973a-401241396936</title>
      <link>https://db.gcve.eu/sighting/41696df4-7654-4164-973a-401241396936/export</link>
      <description>{"uuid": "41696df4-7654-4164-973a-401241396936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16120", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:41.927735Z"}</description>
      <content:encoded>{"uuid": "41696df4-7654-4164-973a-401241396936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-16120", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:41.927735Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/41696df4-7654-4164-973a-401241396936/export</guid>
      <pubDate>Tue, 08 Jul 2025 07:10:41 +0000</pubDate>
    </item>
  </channel>
</rss>
