<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T13:22:13.571055+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e176f286-ddfd-4428-be0a-2266bf129548/export</id>
    <title>e176f286-ddfd-4428-be0a-2266bf129548</title>
    <updated>2026-05-02T13:22:13.937761+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e176f286-ddfd-4428-be0a-2266bf129548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21308", "type": "seen", "source": "https://t.me/cibsecurity/24245", "content": "\u203c CVE-2021-21308 \u203c\n\nPrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 the soft logout system is not complete and an attacker is able to foreign request and executes customer commands. The problem is fixed in 1.7.7.2\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T22:39:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e176f286-ddfd-4428-be0a-2266bf129548/export"/>
    <published>2021-02-26T22:39:24+00:00</published>
  </entry>
</feed>
