<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T18:43:47.789471+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d77a6495-e200-4cba-9a23-a32518ecc0ed/export</id>
    <title>d77a6495-e200-4cba-9a23-a32518ecc0ed</title>
    <updated>2026-05-11T18:43:48.318542+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d77a6495-e200-4cba-9a23-a32518ecc0ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3323", "type": "seen", "source": "https://t.me/cibsecurity/30473", "content": "\u203c CVE-2021-3323 \u203c\n\nInteger Underflow in 6LoWPAN IPHC Header Uncompression in Zephyr. Zephyr versions &amp;gt;= &amp;gt;=2.4.0 contain Integer Underflow (Wrap or Wraparound) (CWE-191). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-13T02:25:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d77a6495-e200-4cba-9a23-a32518ecc0ed/export"/>
    <published>2021-10-13T02:25:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/992e439e-77e1-4b03-bec6-4d33d3bb26f8/export</id>
    <title>992e439e-77e1-4b03-bec6-4d33d3bb26f8</title>
    <updated>2026-05-11T18:43:48.318489+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "992e439e-77e1-4b03-bec6-4d33d3bb26f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33236", "type": "seen", "source": "https://t.me/cibsecurity/48181", "content": "\u203c CVE-2021-33236 \u203c\n\nBuffer Overflow vulnerability in write_header in htmldoc through 1.9.11 allows attackers to casue a denial of service via /htmldoc/htmldoc/html.cxx:273.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T00:38:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/992e439e-77e1-4b03-bec6-4d33d3bb26f8/export"/>
    <published>2022-08-16T00:38:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/608e518e-27d5-418f-9fed-a76fd77fc0cf/export</id>
    <title>608e518e-27d5-418f-9fed-a76fd77fc0cf</title>
    <updated>2026-05-11T18:43:48.318423+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "608e518e-27d5-418f-9fed-a76fd77fc0cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33235", "type": "seen", "source": "https://t.me/cibsecurity/48192", "content": "\u203c CVE-2021-33235 \u203c\n\nBuffer overflow vulnerability in write_node in htmldoc through 1.9.11 allows attackers to cause a denial of service via htmldoc/htmldoc/html.cxx:588.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T00:38:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/608e518e-27d5-418f-9fed-a76fd77fc0cf/export"/>
    <published>2022-08-16T00:38:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2eb2a0af-d8da-4c44-9218-a9178919dd10/export</id>
    <title>2eb2a0af-d8da-4c44-9218-a9178919dd10</title>
    <updated>2026-05-11T18:43:48.318260+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2eb2a0af-d8da-4c44-9218-a9178919dd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33231", "type": "seen", "source": "https://t.me/cibsecurity/51863", "content": "\u203c CVE-2021-33231 \u203c\n\nCross Site Scripting (XSS) vulnerability in New equipment page in EasyVista Service Manager 2018.1.181.1 allows remote attackers to run arbitrary code via the notes field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-20T14:21:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2eb2a0af-d8da-4c44-9218-a9178919dd10/export"/>
    <published>2022-10-20T14:21:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4fc5ab0d-30f7-460a-b8a5-b9912f822608/export</id>
    <title>4fc5ab0d-30f7-460a-b8a5-b9912f822608</title>
    <updated>2026-05-11T18:43:48.317956+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4fc5ab0d-30f7-460a-b8a5-b9912f822608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33237", "type": "seen", "source": "https://t.me/cibsecurity/58462", "content": "\u203c CVE-2021-33237 \u203c\n\nCross Site Scripting vulnerability in YMFE yapo v1.9.1 allows attacker to execute arbitrary code via the remark parameter of the interface edit page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T20:13:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4fc5ab0d-30f7-460a-b8a5-b9912f822608/export"/>
    <published>2023-02-17T20:13:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4b08eb54-4914-466e-a2e6-ad31136d9cbc/export</id>
    <title>4b08eb54-4914-466e-a2e6-ad31136d9cbc</title>
    <updated>2026-05-11T18:43:48.315424+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4b08eb54-4914-466e-a2e6-ad31136d9cbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33231", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15575", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-33231\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross Site Scripting (XSS) vulnerability in New equipment page in EasyVista Service Manager 2018.1.181.1 allows remote attackers to run arbitrary code via the notes field.\n\ud83d\udccf Published: 2022-10-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T18:04:33.926Z\n\ud83d\udd17 References:\n1. http://easyvista.com\n2. https://armysick.github.io/cve-2021-33231/", "creation_timestamp": "2025-05-08T18:24:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4b08eb54-4914-466e-a2e6-ad31136d9cbc/export"/>
    <published>2025-05-08T18:24:18+00:00</published>
  </entry>
</feed>
