<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T04:02:54.870844+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ed17c20f-d560-48c5-8e0a-94a7f2b1c25a/export</id>
    <title>ed17c20f-d560-48c5-8e0a-94a7f2b1c25a</title>
    <updated>2026-05-05T04:02:55.267674+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ed17c20f-d560-48c5-8e0a-94a7f2b1c25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41596", "type": "seen", "source": "https://t.me/cibsecurity/29889", "content": "\u203c CVE-2021-41596 \u203c\n\nSuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-04T20:23:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ed17c20f-d560-48c5-8e0a-94a7f2b1c25a/export"/>
    <published>2021-10-04T20:23:27+00:00</published>
  </entry>
</feed>
