<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:58:06 +0000</lastBuildDate>
    <item>
      <title>da8a5023-a180-42ad-969c-1dcd6687976c</title>
      <link>https://vulnerability.circl.lu/sighting/da8a5023-a180-42ad-969c-1dcd6687976c/export</link>
      <description>{"uuid": "da8a5023-a180-42ad-969c-1dcd6687976c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18643", "type": "seen", "source": "https://t.me/cibsecurity/21798", "content": "\u203c CVE-2019-18643 \u203c\n\nRock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T00:41:03.000000Z"}</description>
      <content:encoded>{"uuid": "da8a5023-a180-42ad-969c-1dcd6687976c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18643", "type": "seen", "source": "https://t.me/cibsecurity/21798", "content": "\u203c CVE-2019-18643 \u203c\n\nRock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T00:41:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/da8a5023-a180-42ad-969c-1dcd6687976c/export</guid>
      <pubDate>Fri, 08 Jan 2021 00:41:03 +0000</pubDate>
    </item>
  </channel>
</rss>
