<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T22:30:28.877614+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6a9e0904-dd2f-4a1d-bbda-aebaf94bd95b/export</id>
    <title>6a9e0904-dd2f-4a1d-bbda-aebaf94bd95b</title>
    <updated>2026-05-02T22:30:29.400324+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6a9e0904-dd2f-4a1d-bbda-aebaf94bd95b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-10100", "type": "seen", "source": "https://t.me/cveNotify/197", "content": "\ud83d\udea8 #CVE-2019-10100\nIn JetBrains YouTrack Confluence plugin versions before 1.8.1.3, it was possible to achieve Server Side Template Injection. The attacker could add an Issue macro to the page in Confluence, and use a combination of a valid id field and spe... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10100\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T18:00:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6a9e0904-dd2f-4a1d-bbda-aebaf94bd95b/export"/>
    <published>2019-07-04T18:00:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/82ccaeaa-9476-436a-8c5f-fbd17f40ce06/export</id>
    <title>82ccaeaa-9476-436a-8c5f-fbd17f40ce06</title>
    <updated>2026-05-02T22:30:29.400216+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "82ccaeaa-9476-436a-8c5f-fbd17f40ce06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-10100", "type": "seen", "source": "https://t.me/cveNotify/253", "content": "\ud83d\udea8 #CVE-2019-10100\nIn JetBrains YouTrack Confluence plugin versions before 1.8.1.3, it was possible to achieve Server Side Template Injection. The attacker could add an Issue macro to the page in Confluence, and use a combination of a valid id field and spe... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10100\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/82ccaeaa-9476-436a-8c5f-fbd17f40ce06/export"/>
    <published>2019-07-05T17:00:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2969138a-54ef-41bf-83dc-89654ab246b7/export</id>
    <title>2969138a-54ef-41bf-83dc-89654ab246b7</title>
    <updated>2026-05-02T22:30:29.400092+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2969138a-54ef-41bf-83dc-89654ab246b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1010083", "type": "seen", "source": "https://gist.github.com/Ottapiens/e20fd8a5b3d73cb0ffa38013f25292e1", "content": "", "creation_timestamp": "2025-11-22T10:05:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2969138a-54ef-41bf-83dc-89654ab246b7/export"/>
    <published>2025-11-22T10:05:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/744bc4e2-5079-4192-9505-73492b1fc946/export</id>
    <title>744bc4e2-5079-4192-9505-73492b1fc946</title>
    <updated>2026-05-02T22:30:29.398663+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "744bc4e2-5079-4192-9505-73492b1fc946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1010083", "type": "seen", "source": "https://gist.github.com/Ottapiens/eec03543750502c92edc81d7c568d88c", "content": "", "creation_timestamp": "2025-11-22T10:06:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/744bc4e2-5079-4192-9505-73492b1fc946/export"/>
    <published>2025-11-22T10:06:48+00:00</published>
  </entry>
</feed>
