<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-13T04:06:38.899531+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1feec8e1-3a96-40db-ad7a-68129c36dc33/export</id>
    <title>1feec8e1-3a96-40db-ad7a-68129c36dc33</title>
    <updated>2026-05-13T04:06:39.283937+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1feec8e1-3a96-40db-ad7a-68129c36dc33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41746", "type": "seen", "source": "https://t.me/cibsecurity/31475", "content": "\u203c CVE-2021-41746 \u203c\n\nSQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-29T22:18:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1feec8e1-3a96-40db-ad7a-68129c36dc33/export"/>
    <published>2021-10-29T22:18:27+00:00</published>
  </entry>
</feed>
