<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:36:19.417346+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8bfa7f39-b231-4f9d-b8f6-7aec36010f1b/export</id>
    <title>8bfa7f39-b231-4f9d-b8f6-7aec36010f1b</title>
    <updated>2026-05-04T21:36:19.790012+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8bfa7f39-b231-4f9d-b8f6-7aec36010f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12000", "type": "seen", "source": "https://t.me/cibsecurity/13536", "content": "ATENTION\u203c New - CVE-2019-12000\n\nHPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-18T07:55:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8bfa7f39-b231-4f9d-b8f6-7aec36010f1b/export"/>
    <published>2020-07-18T07:55:17+00:00</published>
  </entry>
</feed>
