<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:59:54.469652+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c98fa902-9cd1-41bd-bf1e-550995e3fcd4/export</id>
    <title>c98fa902-9cd1-41bd-bf1e-550995e3fcd4</title>
    <updated>2026-05-04T09:59:54.823321+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c98fa902-9cd1-41bd-bf1e-550995e3fcd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-39213", "type": "seen", "source": "https://t.me/cibsecurity/28919", "content": "\u203c CVE-2021-39213 \u203c\n\nGLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-15T20:22:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c98fa902-9cd1-41bd-bf1e-550995e3fcd4/export"/>
    <published>2021-09-15T20:22:05+00:00</published>
  </entry>
</feed>
