<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T23:02:05.288175+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0596d97d-8dce-442c-8ede-0ba51e139867/export</id>
    <title>0596d97d-8dce-442c-8ede-0ba51e139867</title>
    <updated>2026-05-02T23:02:05.296816+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0596d97d-8dce-442c-8ede-0ba51e139867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-21)", "content": "", "creation_timestamp": "2026-04-21T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0596d97d-8dce-442c-8ede-0ba51e139867/export"/>
    <published>2026-04-21T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9a830f01-2872-47dc-b119-1dadcac796be/export</id>
    <title>9a830f01-2872-47dc-b119-1dadcac796be</title>
    <updated>2026-05-02T23:02:05.296771+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9a830f01-2872-47dc-b119-1dadcac796be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9a830f01-2872-47dc-b119-1dadcac796be/export"/>
    <published>2026-04-24T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5c376bef-e2e1-481b-9469-283a7761fdda/export</id>
    <title>5c376bef-e2e1-481b-9469-283a7761fdda</title>
    <updated>2026-05-02T23:02:05.296725+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5c376bef-e2e1-481b-9469-283a7761fdda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-25)", "content": "", "creation_timestamp": "2026-04-25T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5c376bef-e2e1-481b-9469-283a7761fdda/export"/>
    <published>2026-04-25T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2fc54dcd-09ba-45fa-b437-00028efe58c9/export</id>
    <title>2fc54dcd-09ba-45fa-b437-00028efe58c9</title>
    <updated>2026-05-02T23:02:05.296677+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2fc54dcd-09ba-45fa-b437-00028efe58c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-26)", "content": "", "creation_timestamp": "2026-04-26T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2fc54dcd-09ba-45fa-b437-00028efe58c9/export"/>
    <published>2026-04-26T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/88d31af4-8744-44d6-843e-42a213d46eda/export</id>
    <title>88d31af4-8744-44d6-843e-42a213d46eda</title>
    <updated>2026-05-02T23:02:05.296627+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "88d31af4-8744-44d6-843e-42a213d46eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/88d31af4-8744-44d6-843e-42a213d46eda/export"/>
    <published>2026-04-27T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dbc4b1ed-5829-4b9a-a41d-ad586c3872bd/export</id>
    <title>dbc4b1ed-5829-4b9a-a41d-ad586c3872bd</title>
    <updated>2026-05-02T23:02:05.296574+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "dbc4b1ed-5829-4b9a-a41d-ad586c3872bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-26855", "type": "seen", "source": "MISP/d6af00ee-c1eb-44fd-8cc5-6fb794d5ddd4", "content": "", "creation_timestamp": "2026-04-27T17:54:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dbc4b1ed-5829-4b9a-a41d-ad586c3872bd/export"/>
    <published>2026-04-27T17:54:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8ab2dd72-5569-458f-86c8-5498ba1f63f0/export</id>
    <title>8ab2dd72-5569-458f-86c8-5498ba1f63f0</title>
    <updated>2026-05-02T23:02:05.296505+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8ab2dd72-5569-458f-86c8-5498ba1f63f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-26858", "type": "seen", "source": "MISP/d6af00ee-c1eb-44fd-8cc5-6fb794d5ddd4", "content": "", "creation_timestamp": "2026-04-27T17:54:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8ab2dd72-5569-458f-86c8-5498ba1f63f0/export"/>
    <published>2026-04-27T17:54:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5d8a2415-ac72-404d-9af5-3904fc482eb1/export</id>
    <title>5d8a2415-ac72-404d-9af5-3904fc482eb1</title>
    <updated>2026-05-02T23:02:05.295587+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "5d8a2415-ac72-404d-9af5-3904fc482eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-26857", "type": "seen", "source": "MISP/d6af00ee-c1eb-44fd-8cc5-6fb794d5ddd4", "content": "", "creation_timestamp": "2026-04-27T17:54:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5d8a2415-ac72-404d-9af5-3904fc482eb1/export"/>
    <published>2026-04-27T17:54:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d50539ca-aaf5-4afb-b6c0-17ea85887dbc/export</id>
    <title>d50539ca-aaf5-4afb-b6c0-17ea85887dbc</title>
    <updated>2026-05-02T23:02:05.295505+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d50539ca-aaf5-4afb-b6c0-17ea85887dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d50539ca-aaf5-4afb-b6c0-17ea85887dbc/export"/>
    <published>2026-04-28T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/edd124ab-14d2-4fae-bddb-b48553df0f30/export</id>
    <title>edd124ab-14d2-4fae-bddb-b48553df0f30</title>
    <updated>2026-05-02T23:02:05.294599+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "edd124ab-14d2-4fae-bddb-b48553df0f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-26855", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/edd124ab-14d2-4fae-bddb-b48553df0f30/export"/>
    <published>2026-04-28T00:00:00+00:00</published>
  </entry>
</feed>
