<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T05:09:35.156794+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1612a09f-748e-4863-ae1c-6ae7cb1b353b/export</id>
    <title>1612a09f-748e-4863-ae1c-6ae7cb1b353b</title>
    <updated>2026-05-02T05:09:35.503735+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1612a09f-748e-4863-ae1c-6ae7cb1b353b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://t.me/cibsecurity/24049", "content": "\u203c CVE-2021-3407 \u203c\n\nA flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-24T02:35:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1612a09f-748e-4863-ae1c-6ae7cb1b353b/export"/>
    <published>2021-02-24T02:35:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/81f50f3b-7eea-4a23-b331-3239b0dcf65e/export</id>
    <title>81f50f3b-7eea-4a23-b331-3239b0dcf65e</title>
    <updated>2026-05-02T05:09:35.503494+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "81f50f3b-7eea-4a23-b331-3239b0dcf65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34073", "type": "seen", "source": "https://t.me/cibsecurity/36469", "content": "\u203c CVE-2021-34073 \u203c\n\nA Cross Site Scripting (XSS) vulnerabilty exists in Sourcecodester Gadget Works Online Ordering System in PHP/MySQLi 1.0 via the Category parameter in an add function in category/index.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T20:21:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/81f50f3b-7eea-4a23-b331-3239b0dcf65e/export"/>
    <published>2022-01-28T20:21:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/42c18e59-98d7-4393-973c-3fb3c1ab400a/export</id>
    <title>42c18e59-98d7-4393-973c-3fb3c1ab400a</title>
    <updated>2026-05-02T05:09:35.503193+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "42c18e59-98d7-4393-973c-3fb3c1ab400a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34076", "type": "seen", "source": "https://t.me/cibsecurity/63885", "content": "\u203c CVE-2021-34076 \u203c\n\nFile Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T16:15:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/42c18e59-98d7-4393-973c-3fb3c1ab400a/export"/>
    <published>2023-05-11T16:15:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2f83e1c8-17b6-4e21-a382-853f8db4d5ef/export</id>
    <title>2f83e1c8-17b6-4e21-a382-853f8db4d5ef</title>
    <updated>2026-05-02T05:09:35.500627+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2f83e1c8-17b6-4e21-a382-853f8db4d5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5f8fdc3f74ca6b1ca4bc23bf7fb17c2e", "content": "", "creation_timestamp": "2025-10-16T10:17:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2f83e1c8-17b6-4e21-a382-853f8db4d5ef/export"/>
    <published>2025-10-16T10:17:08+00:00</published>
  </entry>
</feed>
