<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 06:28:39 +0000</lastBuildDate>
    <item>
      <title>8bfa7f39-b231-4f9d-b8f6-7aec36010f1b</title>
      <link>https://vulnerability.circl.lu/sighting/8bfa7f39-b231-4f9d-b8f6-7aec36010f1b/export</link>
      <description>{"uuid": "8bfa7f39-b231-4f9d-b8f6-7aec36010f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12000", "type": "seen", "source": "https://t.me/cibsecurity/13536", "content": "ATENTION\u203c New - CVE-2019-12000\n\nHPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-18T07:55:17.000000Z"}</description>
      <content:encoded>{"uuid": "8bfa7f39-b231-4f9d-b8f6-7aec36010f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12000", "type": "seen", "source": "https://t.me/cibsecurity/13536", "content": "ATENTION\u203c New - CVE-2019-12000\n\nHPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-18T07:55:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8bfa7f39-b231-4f9d-b8f6-7aec36010f1b/export</guid>
      <pubDate>Sat, 18 Jul 2020 07:55:17 +0000</pubDate>
    </item>
  </channel>
</rss>
