<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T23:50:37.721795+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/79d2384b-0741-4b29-8b17-01a472cfc781/export</id>
    <title>79d2384b-0741-4b29-8b17-01a472cfc781</title>
    <updated>2026-05-03T23:50:38.040568+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "79d2384b-0741-4b29-8b17-01a472cfc781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27593", "type": "seen", "source": "https://t.me/cibsecurity/25235", "content": "\u203c CVE-2021-27593 \u203c\n\nWhen a user opens manipulated Graphics Interchange Format (.GIF) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-22T19:37:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/79d2384b-0741-4b29-8b17-01a472cfc781/export"/>
    <published>2021-03-22T19:37:28+00:00</published>
  </entry>
</feed>
