<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 00:19:59 +0000</lastBuildDate>
    <item>
      <title>9974902e-ce66-4693-9a4c-9629a6586e24</title>
      <link>https://db.gcve.eu/sighting/9974902e-ce66-4693-9a4c-9629a6586e24/export</link>
      <description>{"uuid": "9974902e-ce66-4693-9a4c-9629a6586e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20482", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:58.000000Z"}</description>
      <content:encoded>{"uuid": "9974902e-ce66-4693-9a4c-9629a6586e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20482", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9974902e-ce66-4693-9a4c-9629a6586e24/export</guid>
      <pubDate>Fri, 11 Dec 2020 22:38:58 +0000</pubDate>
    </item>
    <item>
      <title>7bdf4479-23a4-43ef-8467-a8813a90138f</title>
      <link>https://db.gcve.eu/sighting/7bdf4479-23a4-43ef-8467-a8813a90138f/export</link>
      <description>{"uuid": "7bdf4479-23a4-43ef-8467-a8813a90138f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20501", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:31.000000Z"}</description>
      <content:encoded>{"uuid": "7bdf4479-23a4-43ef-8467-a8813a90138f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20501", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7bdf4479-23a4-43ef-8467-a8813a90138f/export</guid>
      <pubDate>Fri, 11 Dec 2020 22:54:31 +0000</pubDate>
    </item>
    <item>
      <title>65b820d6-dceb-4fe9-adf4-04a32e203265</title>
      <link>https://db.gcve.eu/sighting/65b820d6-dceb-4fe9-adf4-04a32e203265/export</link>
      <description>{"uuid": "65b820d6-dceb-4fe9-adf4-04a32e203265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20521", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:24.000000Z"}</description>
      <content:encoded>{"uuid": "65b820d6-dceb-4fe9-adf4-04a32e203265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20521", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/65b820d6-dceb-4fe9-adf4-04a32e203265/export</guid>
      <pubDate>Fri, 11 Dec 2020 23:25:24 +0000</pubDate>
    </item>
    <item>
      <title>1e383fc9-5f8d-4024-a953-6061d0b16381</title>
      <link>https://db.gcve.eu/sighting/1e383fc9-5f8d-4024-a953-6061d0b16381/export</link>
      <description>{"uuid": "1e383fc9-5f8d-4024-a953-6061d0b16381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20541", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:23.000000Z"}</description>
      <content:encoded>{"uuid": "1e383fc9-5f8d-4024-a953-6061d0b16381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20541", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1e383fc9-5f8d-4024-a953-6061d0b16381/export</guid>
      <pubDate>Sat, 12 Dec 2020 00:25:23 +0000</pubDate>
    </item>
    <item>
      <title>6cf33182-472c-4397-853d-ffe394a8bda3</title>
      <link>https://db.gcve.eu/sighting/6cf33182-472c-4397-853d-ffe394a8bda3/export</link>
      <description>{"uuid": "6cf33182-472c-4397-853d-ffe394a8bda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20554", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:52.000000Z"}</description>
      <content:encoded>{"uuid": "6cf33182-472c-4397-853d-ffe394a8bda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20554", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6cf33182-472c-4397-853d-ffe394a8bda3/export</guid>
      <pubDate>Sat, 12 Dec 2020 00:35:52 +0000</pubDate>
    </item>
    <item>
      <title>49aa2c8f-df05-4c48-a95a-fd325f27eeb6</title>
      <link>https://db.gcve.eu/sighting/49aa2c8f-df05-4c48-a95a-fd325f27eeb6/export</link>
      <description>{"uuid": "49aa2c8f-df05-4c48-a95a-fd325f27eeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20574", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:46.000000Z"}</description>
      <content:encoded>{"uuid": "49aa2c8f-df05-4c48-a95a-fd325f27eeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20574", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/49aa2c8f-df05-4c48-a95a-fd325f27eeb6/export</guid>
      <pubDate>Sat, 12 Dec 2020 00:45:46 +0000</pubDate>
    </item>
    <item>
      <title>6cd0633d-b8db-43df-8816-cdc1ac248329</title>
      <link>https://db.gcve.eu/sighting/6cd0633d-b8db-43df-8816-cdc1ac248329/export</link>
      <description>{"uuid": "6cd0633d-b8db-43df-8816-cdc1ac248329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20593", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:04.000000Z"}</description>
      <content:encoded>{"uuid": "6cd0633d-b8db-43df-8816-cdc1ac248329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20593", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6cd0633d-b8db-43df-8816-cdc1ac248329/export</guid>
      <pubDate>Sat, 12 Dec 2020 01:05:04 +0000</pubDate>
    </item>
    <item>
      <title>a4353920-d8e9-40c6-8538-2532bbc76ba7</title>
      <link>https://db.gcve.eu/sighting/a4353920-d8e9-40c6-8538-2532bbc76ba7/export</link>
      <description>{"uuid": "a4353920-d8e9-40c6-8538-2532bbc76ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20613", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:12.000000Z"}</description>
      <content:encoded>{"uuid": "a4353920-d8e9-40c6-8538-2532bbc76ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20613", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a4353920-d8e9-40c6-8538-2532bbc76ba7/export</guid>
      <pubDate>Sat, 12 Dec 2020 01:25:12 +0000</pubDate>
    </item>
    <item>
      <title>cd7cef5f-db20-40d6-a448-fdd6e8e32113</title>
      <link>https://db.gcve.eu/sighting/cd7cef5f-db20-40d6-a448-fdd6e8e32113/export</link>
      <description>{"uuid": "cd7cef5f-db20-40d6-a448-fdd6e8e32113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20633", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:17.000000Z"}</description>
      <content:encoded>{"uuid": "cd7cef5f-db20-40d6-a448-fdd6e8e32113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20633", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cd7cef5f-db20-40d6-a448-fdd6e8e32113/export</guid>
      <pubDate>Sat, 12 Dec 2020 02:25:17 +0000</pubDate>
    </item>
    <item>
      <title>f7f8cc18-272e-4d74-a898-5c060a5d34ec</title>
      <link>https://db.gcve.eu/sighting/f7f8cc18-272e-4d74-a898-5c060a5d34ec/export</link>
      <description>{"uuid": "f7f8cc18-272e-4d74-a898-5c060a5d34ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2306", "content": "F5 Big IP Vulnerabilities:\n1. F5 TMUI XSS vulnerability (CVE-2020-5948)\nhttps://support.f5.com/csp/article/K42696541\n]-&amp;gt; Restricting access to the Configuration utility by source IP address (11.x-16.x)\nhttps://support.f5.com/csp/article/K13309\n]-&amp;gt; Overview of securing access to the BIG-IP system\n2. BIG-IP LTM vulnerability (CVE-2020-5949)\nhttps://support.f5.com/csp/article/K20984059\n]-&amp;gt; Configuring SYN cookie protection (13.x-16.x)\nhttps://support.f5.com/csp/article/K74451051", "creation_timestamp": "2020-12-16T12:01:59.000000Z"}</description>
      <content:encoded>{"uuid": "f7f8cc18-272e-4d74-a898-5c060a5d34ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2306", "content": "F5 Big IP Vulnerabilities:\n1. F5 TMUI XSS vulnerability (CVE-2020-5948)\nhttps://support.f5.com/csp/article/K42696541\n]-&amp;gt; Restricting access to the Configuration utility by source IP address (11.x-16.x)\nhttps://support.f5.com/csp/article/K13309\n]-&amp;gt; Overview of securing access to the BIG-IP system\n2. BIG-IP LTM vulnerability (CVE-2020-5949)\nhttps://support.f5.com/csp/article/K20984059\n]-&amp;gt; Configuring SYN cookie protection (13.x-16.x)\nhttps://support.f5.com/csp/article/K74451051", "creation_timestamp": "2020-12-16T12:01:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f7f8cc18-272e-4d74-a898-5c060a5d34ec/export</guid>
      <pubDate>Wed, 16 Dec 2020 12:01:59 +0000</pubDate>
    </item>
  </channel>
</rss>
