<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T22:27:09.221300+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64/export</id>
    <title>64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64</title>
    <updated>2026-05-05T22:27:09.612021+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23929", "type": "seen", "source": "https://t.me/cibsecurity/22052", "content": "\u203c CVE-2021-23929 \u203c\n\nOX App Suite through 7.10.4 allows XSS via a crafted Content-Disposition header in an uploaded HTML document to an ajax/share/?delivery=view URI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64/export"/>
    <published>2021-01-13T00:47:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2293f303-7f62-4fc2-9087-df074490544c/export</id>
    <title>2293f303-7f62-4fc2-9087-df074490544c</title>
    <updated>2026-05-05T22:27:09.611972+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2293f303-7f62-4fc2-9087-df074490544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23927", "type": "seen", "source": "https://t.me/cibsecurity/22068", "content": "\u203c CVE-2021-23927 \u203c\n\nOX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2293f303-7f62-4fc2-9087-df074490544c/export"/>
    <published>2021-01-13T00:47:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5a201cdb-808a-491b-a3ac-7ff4d4b634c6/export</id>
    <title>5a201cdb-808a-491b-a3ac-7ff4d4b634c6</title>
    <updated>2026-05-05T22:27:09.611915+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5a201cdb-808a-491b-a3ac-7ff4d4b634c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://t.me/cibsecurity/22165", "content": "\u203c CVE-2021-23926 \u203c\n\nThe XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5a201cdb-808a-491b-a3ac-7ff4d4b634c6/export"/>
    <published>2021-01-14T18:49:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf7c27b9-ed59-4f50-84c7-9e267318c241/export</id>
    <title>bf7c27b9-ed59-4f50-84c7-9e267318c241</title>
    <updated>2026-05-05T22:27:09.611855+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf7c27b9-ed59-4f50-84c7-9e267318c241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2392", "type": "seen", "source": "https://t.me/cibsecurity/26347", "content": "\u203c CVE-2021-2392 \u203c\n\nVulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.7.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:48:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf7c27b9-ed59-4f50-84c7-9e267318c241/export"/>
    <published>2021-07-21T18:48:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/96f0390e-44cb-49f8-9cc7-68c356a60b34/export</id>
    <title>96f0390e-44cb-49f8-9cc7-68c356a60b34</title>
    <updated>2026-05-05T22:27:09.611800+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "96f0390e-44cb-49f8-9cc7-68c356a60b34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/96f0390e-44cb-49f8-9cc7-68c356a60b34/export"/>
    <published>2025-08-31T03:01:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e46c1bae-6118-44c8-b344-538d8337b1d8/export</id>
    <title>e46c1bae-6118-44c8-b344-538d8337b1d8</title>
    <updated>2026-05-05T22:27:09.611728+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e46c1bae-6118-44c8-b344-538d8337b1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e46c1bae-6118-44c8-b344-538d8337b1d8/export"/>
    <published>2025-08-31T03:12:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/45291177-0409-428f-85bd-f65b1d600639/export</id>
    <title>45291177-0409-428f-85bd-f65b1d600639</title>
    <updated>2026-05-05T22:27:09.610794+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "45291177-0409-428f-85bd-f65b1d600639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</content>
    <link href="https://db.gcve.eu/sighting/45291177-0409-428f-85bd-f65b1d600639/export"/>
    <published>2026-01-21T21:18:16.771453+00:00</published>
  </entry>
</feed>
