<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T21:21:52.932850+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/64a9cba6-0ccc-4287-b628-f5f314b940b4/export</id>
    <title>64a9cba6-0ccc-4287-b628-f5f314b940b4</title>
    <updated>2026-05-03T21:21:53.297894+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "64a9cba6-0ccc-4287-b628-f5f314b940b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27200", "type": "seen", "source": "https://t.me/cibsecurity/25405", "content": "\u203c CVE-2021-27200 \u203c\n\nIn WoWonder 3.0.4, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-11T22:37:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/64a9cba6-0ccc-4287-b628-f5f314b940b4/export"/>
    <published>2021-06-11T22:37:08+00:00</published>
  </entry>
</feed>
