<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T04:34:04.390709+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/71537a84-a41a-4006-8863-d95ef9ad6d51/export</id>
    <title>71537a84-a41a-4006-8863-d95ef9ad6d51</title>
    <updated>2026-05-05T04:34:04.669204+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "71537a84-a41a-4006-8863-d95ef9ad6d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40651", "type": "seen", "source": "https://t.me/cibsecurity/29635", "content": "\u203c CVE-2021-40651 \u203c\n\nOS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T16:36:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/71537a84-a41a-4006-8863-d95ef9ad6d51/export"/>
    <published>2021-09-29T16:36:48+00:00</published>
  </entry>
</feed>
