<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:54:59 +0000</lastBuildDate>
    <item>
      <title>f830eec9-ccd6-44d5-827f-31f72cf769d9</title>
      <link>https://db.gcve.eu/sighting/f830eec9-ccd6-44d5-827f-31f72cf769d9/export</link>
      <description>{"uuid": "f830eec9-ccd6-44d5-827f-31f72cf769d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5604", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1726\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1.\n\ud83d\udccf Published: 2025-02-26T19:28:51.480Z\n\ud83d\udccf Modified: 2025-02-26T19:28:51.480Z\n\ud83d\udd17 References:\n1. https://www.esri.com/arcgis-blog/products/monitor/administration/whats-new-in-arcgis-monitor-2024-1/", "creation_timestamp": "2025-02-26T20:25:01.000000Z"}</description>
      <content:encoded>{"uuid": "f830eec9-ccd6-44d5-827f-31f72cf769d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5604", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1726\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1.\n\ud83d\udccf Published: 2025-02-26T19:28:51.480Z\n\ud83d\udccf Modified: 2025-02-26T19:28:51.480Z\n\ud83d\udd17 References:\n1. https://www.esri.com/arcgis-blog/products/monitor/administration/whats-new-in-arcgis-monitor-2024-1/", "creation_timestamp": "2025-02-26T20:25:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f830eec9-ccd6-44d5-827f-31f72cf769d9/export</guid>
      <pubDate>Wed, 26 Feb 2025 20:25:01 +0000</pubDate>
    </item>
    <item>
      <title>b637c6d9-add5-44af-9144-8edf918e168e</title>
      <link>https://db.gcve.eu/sighting/b637c6d9-add5-44af-9144-8edf918e168e/export</link>
      <description>{"uuid": "b637c6d9-add5-44af-9144-8edf918e168e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/cvedetector/18959", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1726 - Esri ArcGIS Monitor SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-1726 \nPublished : Feb. 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T21:48:49.000000Z"}</description>
      <content:encoded>{"uuid": "b637c6d9-add5-44af-9144-8edf918e168e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1726", "type": "seen", "source": "https://t.me/cvedetector/18959", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1726 - Esri ArcGIS Monitor SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-1726 \nPublished : Feb. 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : There is a SQL injection issue\u00a0in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T21:48:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b637c6d9-add5-44af-9144-8edf918e168e/export</guid>
      <pubDate>Wed, 26 Feb 2025 21:48:49 +0000</pubDate>
    </item>
  </channel>
</rss>
