<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:42:33 +0000</lastBuildDate>
    <item>
      <title>d210bfd7-ea93-4578-84e4-438903e47d76</title>
      <link>https://db.gcve.eu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export</link>
      <description>{"uuid": "d210bfd7-ea93-4578-84e4-438903e47d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "published-proof-of-concept", "source": "Telegram/Tvd8QL4SENBdyhrOX8ClGh5gThmxL9s_lOp2aXg1VdaPgg", "content": "", "creation_timestamp": "2021-08-02T20:29:04.000000Z"}</description>
      <content:encoded>{"uuid": "d210bfd7-ea93-4578-84e4-438903e47d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "published-proof-of-concept", "source": "Telegram/Tvd8QL4SENBdyhrOX8ClGh5gThmxL9s_lOp2aXg1VdaPgg", "content": "", "creation_timestamp": "2021-08-02T20:29:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export</guid>
      <pubDate>Mon, 02 Aug 2021 20:29:04 +0000</pubDate>
    </item>
    <item>
      <title>595d63b2-6a06-4e46-9627-4639ac65963e</title>
      <link>https://db.gcve.eu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export</link>
      <description>{"uuid": "595d63b2-6a06-4e46-9627-4639ac65963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/509", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 29 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-23T21:20:17.000000Z"}</description>
      <content:encoded>{"uuid": "595d63b2-6a06-4e46-9627-4639ac65963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/509", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 29 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-23T21:20:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export</guid>
      <pubDate>Thu, 23 Nov 2023 21:20:17 +0000</pubDate>
    </item>
    <item>
      <title>1e1a3245-bfbc-47c2-a92a-5c5308aff6b2</title>
      <link>https://db.gcve.eu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export</link>
      <description>{"uuid": "1e1a3245-bfbc-47c2-a92a-5c5308aff6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/2017", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 31 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T15:54:31.000000Z"}</description>
      <content:encoded>{"uuid": "1e1a3245-bfbc-47c2-a92a-5c5308aff6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/2017", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 31 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T15:54:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export</guid>
      <pubDate>Mon, 18 Dec 2023 15:54:31 +0000</pubDate>
    </item>
  </channel>
</rss>
