<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T23:28:38.827276+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9/export</id>
    <title>acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9</title>
    <updated>2026-05-20T23:28:39.177757+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21651", "type": "seen", "source": "https://t.me/cibsecurity/35009", "content": "\u203c CVE-2022-21651 \u203c\n\nShopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-05T22:40:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9/export"/>
    <published>2022-01-05T22:40:25+00:00</published>
  </entry>
</feed>
