<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T17:14:54.233761+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d994a43d-9f20-4fbc-9bcc-44b9744f67b7/export</id>
    <title>d994a43d-9f20-4fbc-9bcc-44b9744f67b7</title>
    <updated>2026-05-01T17:14:54.687888+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d994a43d-9f20-4fbc-9bcc-44b9744f67b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29451", "type": "seen", "source": "https://t.me/cibsecurity/23583", "content": "\u203c CVE-2020-29451 \u203c\n\nAffected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate Jira projects via an Information Disclosure vulnerability in the Jira Projects plugin report page. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.14.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-15T07:46:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d994a43d-9f20-4fbc-9bcc-44b9744f67b7/export"/>
    <published>2021-02-15T07:46:07+00:00</published>
  </entry>
</feed>
