<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T07:10:46.655913+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c4bb2e7a-8e85-4882-9751-32c996d0a61b/export</id>
    <title>c4bb2e7a-8e85-4882-9751-32c996d0a61b</title>
    <updated>2026-05-06T07:10:47.166110+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c4bb2e7a-8e85-4882-9751-32c996d0a61b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-35478", "type": "seen", "source": "https://t.me/cibsecurity/26612", "content": "\u203c CVE-2021-35478 \u203c\n\nNagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:21:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c4bb2e7a-8e85-4882-9751-32c996d0a61b/export"/>
    <published>2021-07-30T18:21:23+00:00</published>
  </entry>
</feed>
