<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T00:12:28.259742+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c0eeef47-473d-4c10-922b-b8416fd8d15a/export</id>
    <title>c0eeef47-473d-4c10-922b-b8416fd8d15a</title>
    <updated>2026-05-06T00:12:28.685359+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c0eeef47-473d-4c10-922b-b8416fd8d15a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2373", "type": "seen", "source": "https://t.me/cibsecurity/26344", "content": "\u203c CVE-2021-2373 \u203c\n\nVulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime). Supported versions that are affected are 9.2.5.3 and Prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:48:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c0eeef47-473d-4c10-922b-b8416fd8d15a/export"/>
    <published>2021-07-21T18:48:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/abc7c715-73e7-4207-a4d5-8ed80a6e429a/export</id>
    <title>abc7c715-73e7-4207-a4d5-8ed80a6e429a</title>
    <updated>2026-05-06T00:12:28.684255+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "abc7c715-73e7-4207-a4d5-8ed80a6e429a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23732", "type": "seen", "source": "https://t.me/cibsecurity/32806", "content": "\u203c CVE-2021-23732 \u203c\n\nThis affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-22T20:20:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/abc7c715-73e7-4207-a4d5-8ed80a6e429a/export"/>
    <published>2021-11-22T20:20:13+00:00</published>
  </entry>
</feed>
