<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T16:14:33.786385+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b90184d8-88cb-4bb8-ad67-b20502fb0505/export</id>
    <title>b90184d8-88cb-4bb8-ad67-b20502fb0505</title>
    <updated>2026-04-30T16:14:34.114473+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b90184d8-88cb-4bb8-ad67-b20502fb0505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3182", "type": "seen", "source": "https://t.me/cibsecurity/22268", "content": "\u203c CVE-2021-3182 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-19T18:56:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b90184d8-88cb-4bb8-ad67-b20502fb0505/export"/>
    <published>2021-01-19T18:56:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/51c84cf3-8ef0-4cc1-bfcd-174baf1ed712/export</id>
    <title>51c84cf3-8ef0-4cc1-bfcd-174baf1ed712</title>
    <updated>2026-04-30T16:14:34.114420+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "51c84cf3-8ef0-4cc1-bfcd-174baf1ed712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "Telegram/r-7YQxAfvosWTOr1K8eBhRRQgWXHvVBAJhQ8hcA6wiwgrrM", "content": "", "creation_timestamp": "2021-05-07T17:46:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/51c84cf3-8ef0-4cc1-bfcd-174baf1ed712/export"/>
    <published>2021-05-07T17:46:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f365a19-28b8-4740-a44b-4d367558364b/export</id>
    <title>6f365a19-28b8-4740-a44b-4d367558364b</title>
    <updated>2026-04-30T16:14:34.114365+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6f365a19-28b8-4740-a44b-4d367558364b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31829", "type": "published-proof-of-concept", "source": "Telegram/5Xahx5s1HhKdN4WjLEOJkICHXeU47VdBG4ybsFceuenzTxY", "content": "", "creation_timestamp": "2021-05-07T17:47:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f365a19-28b8-4740-a44b-4d367558364b/export"/>
    <published>2021-05-07T17:47:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7144e630-fd88-4db9-b3f8-dc2be5a4b458/export</id>
    <title>7144e630-fd88-4db9-b3f8-dc2be5a4b458</title>
    <updated>2026-04-30T16:14:34.114307+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7144e630-fd88-4db9-b3f8-dc2be5a4b458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3350", "content": "#Threat_Research\nSSRF in Open Distro for Elasticsearch\n(PoC for CVE-2021-31828)\nhttps://rotem-bar.com/ssrf-in-open-distro-for-elasticsearch-cve-2021-31828", "creation_timestamp": "2021-05-12T11:01:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7144e630-fd88-4db9-b3f8-dc2be5a4b458/export"/>
    <published>2021-05-12T11:01:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/38e402d2-9732-4462-8164-d1e05f0f618c/export</id>
    <title>38e402d2-9732-4462-8164-d1e05f0f618c</title>
    <updated>2026-04-30T16:14:34.114244+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "38e402d2-9732-4462-8164-d1e05f0f618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31820", "type": "seen", "source": "https://t.me/cibsecurity/27498", "content": "\u203c CVE-2021-31820 \u203c\n\nIn Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T14:16:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/38e402d2-9732-4462-8164-d1e05f0f618c/export"/>
    <published>2021-08-18T14:16:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e37d9faa-a909-4b52-95d7-639e259762e5/export</id>
    <title>e37d9faa-a909-4b52-95d7-639e259762e5</title>
    <updated>2026-04-30T16:14:34.114161+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e37d9faa-a909-4b52-95d7-639e259762e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31822", "type": "seen", "source": "https://t.me/cibsecurity/32955", "content": "\u203c CVE-2021-31822 \u203c\n\nWhen Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-24T18:27:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e37d9faa-a909-4b52-95d7-639e259762e5/export"/>
    <published>2021-11-24T18:27:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4d0bfa3a-b259-41fa-be94-63cd0f9842da/export</id>
    <title>4d0bfa3a-b259-41fa-be94-63cd0f9842da</title>
    <updated>2026-04-30T16:14:34.113163+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d0bfa3a-b259-41fa-be94-63cd0f9842da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31821", "type": "seen", "source": "https://t.me/cibsecurity/35775", "content": "\u203c CVE-2021-31821 \u203c\n\nWhen the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-19T12:25:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d0bfa3a-b259-41fa-be94-63cd0f9842da/export"/>
    <published>2022-01-19T12:25:40+00:00</published>
  </entry>
</feed>
