<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-13T08:51:51.944241+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1ab6211d-4a53-4b0d-b221-53d15f4861a9/export</id>
    <title>1ab6211d-4a53-4b0d-b221-53d15f4861a9</title>
    <updated>2026-05-13T08:51:52.301527+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1ab6211d-4a53-4b0d-b221-53d15f4861a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-36186", "type": "seen", "source": "https://t.me/cibsecurity/31634", "content": "\u203c CVE-2021-36186 \u203c\n\nA stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1ab6211d-4a53-4b0d-b221-53d15f4861a9/export"/>
    <published>2021-11-02T21:23:27+00:00</published>
  </entry>
</feed>
