<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T01:35:26.717547+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/268794b6-44dd-4cc4-8c36-ec0fc7a4ec61/export</id>
    <title>268794b6-44dd-4cc4-8c36-ec0fc7a4ec61</title>
    <updated>2026-05-04T01:35:27.076345+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "268794b6-44dd-4cc4-8c36-ec0fc7a4ec61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43264", "type": "seen", "source": "https://t.me/cibsecurity/31668", "content": "\u203c CVE-2021-43264 \u203c\n\nIn Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, adjusting the path component for the page help file allows attackers to bypass the intended access control for HTML files via directory traversal. It replaces the - character with the / character.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T01:23:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/268794b6-44dd-4cc4-8c36-ec0fc7a4ec61/export"/>
    <published>2021-11-03T01:23:04+00:00</published>
  </entry>
</feed>
