<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T00:12:28.057485+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5e626a7d-04b0-45ee-a36f-f18d004debdf/export</id>
    <title>5e626a7d-04b0-45ee-a36f-f18d004debdf</title>
    <updated>2026-05-06T00:12:28.452084+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5e626a7d-04b0-45ee-a36f-f18d004debdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23975", "type": "seen", "source": "https://t.me/cibsecurity/24193", "content": "\u203c CVE-2021-23975 \u203c\n\nThe developer page about:memory has a Measure function for exploring what object types the browser has allocated and their sizes. When this function was invoked we incorrectly called the sizeof function, instead of using the API method that checks for invalid pointers. This vulnerability affects Firefox &amp;lt; 86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T07:38:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5e626a7d-04b0-45ee-a36f-f18d004debdf/export"/>
    <published>2021-02-26T07:38:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5e129d77-e5b4-4dd3-8dba-4967b6846bb0/export</id>
    <title>5e129d77-e5b4-4dd3-8dba-4967b6846bb0</title>
    <updated>2026-05-06T00:12:28.451976+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5e129d77-e5b4-4dd3-8dba-4967b6846bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23970", "type": "seen", "source": "https://t.me/cibsecurity/24199", "content": "\u203c CVE-2021-23970 \u203c\n\nContext-specific code was included in a shared jump table; resulting in assertions being triggered in multithreaded wasm code. This vulnerability affects Firefox &amp;lt; 86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T07:38:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5e129d77-e5b4-4dd3-8dba-4967b6846bb0/export"/>
    <published>2021-02-26T07:38:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/24b6ff3b-80ba-4b10-817c-5d0de25845d0/export</id>
    <title>24b6ff3b-80ba-4b10-817c-5d0de25845d0</title>
    <updated>2026-05-06T00:12:28.451864+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "24b6ff3b-80ba-4b10-817c-5d0de25845d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23972", "type": "seen", "source": "https://t.me/cibsecurity/24201", "content": "\u203c CVE-2021-23972 \u203c\n\nOne phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox &amp;lt; 86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T07:38:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/24b6ff3b-80ba-4b10-817c-5d0de25845d0/export"/>
    <published>2021-02-26T07:38:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b1789dc7-eca7-4eba-b8ea-63bda124de01/export</id>
    <title>b1789dc7-eca7-4eba-b8ea-63bda124de01</title>
    <updated>2026-05-06T00:12:28.451753+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b1789dc7-eca7-4eba-b8ea-63bda124de01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23977", "type": "seen", "source": "https://t.me/cibsecurity/24203", "content": "\u203c CVE-2021-23977 \u203c\n\nFirefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories. Note: This issue is only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox &amp;lt; 86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T07:38:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b1789dc7-eca7-4eba-b8ea-63bda124de01/export"/>
    <published>2021-02-26T07:38:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/831a554b-e12a-4d16-be45-95bbdc853139/export</id>
    <title>831a554b-e12a-4d16-be45-95bbdc853139</title>
    <updated>2026-05-06T00:12:28.451645+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "831a554b-e12a-4d16-be45-95bbdc853139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23978", "type": "seen", "source": "https://t.me/cibsecurity/24223", "content": "\u203c CVE-2021-23978 \u203c\n\nMozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 86, Thunderbird &amp;lt; 78.8, and Firefox ESR &amp;lt; 78.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T18:39:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/831a554b-e12a-4d16-be45-95bbdc853139/export"/>
    <published>2021-02-26T18:39:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4482f10a-a045-4c7c-90d8-faacf9c51913/export</id>
    <title>4482f10a-a045-4c7c-90d8-faacf9c51913</title>
    <updated>2026-05-06T00:12:28.451493+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4482f10a-a045-4c7c-90d8-faacf9c51913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23979", "type": "seen", "source": "https://t.me/cibsecurity/24225", "content": "\u203c CVE-2021-23979 \u203c\n\nMozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T18:39:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4482f10a-a045-4c7c-90d8-faacf9c51913/export"/>
    <published>2021-02-26T18:39:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f3192cc5-2194-4001-a740-ec613cd69635/export</id>
    <title>f3192cc5-2194-4001-a740-ec613cd69635</title>
    <updated>2026-05-06T00:12:28.449316+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f3192cc5-2194-4001-a740-ec613cd69635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2397", "type": "seen", "source": "https://t.me/cibsecurity/26352", "content": "\u203c CVE-2021-2397 \u203c\n\nVulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:51:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f3192cc5-2194-4001-a740-ec613cd69635/export"/>
    <published>2021-07-21T18:51:19+00:00</published>
  </entry>
</feed>
