<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T23:19:26.626724+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/84300a63-b2ee-4450-b2b5-8ec236ea43b0/export</id>
    <title>84300a63-b2ee-4450-b2b5-8ec236ea43b0</title>
    <updated>2026-05-22T23:19:27.001348+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "84300a63-b2ee-4450-b2b5-8ec236ea43b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44124", "type": "seen", "source": "https://t.me/cibsecurity/39651", "content": "\u203c CVE-2021-44124 \u203c\n\nHiby Music Hiby OS R3 Pro 1.5 and 1.6 is vulnerable to Directory Traversal. The HTTP Server does not have enough input data sanitization when shown data from SD Card, an attacker can navigate through the device's File System over HTTP.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-28T20:40:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/84300a63-b2ee-4450-b2b5-8ec236ea43b0/export"/>
    <published>2022-03-28T20:40:18+00:00</published>
  </entry>
</feed>
