<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T09:26:43.577513+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7456136c-43fc-4d3b-848c-d2101d54791a/export</id>
    <title>7456136c-43fc-4d3b-848c-d2101d54791a</title>
    <updated>2026-05-24T09:26:44.134253+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7456136c-43fc-4d3b-848c-d2101d54791a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44886", "type": "seen", "source": "https://t.me/cibsecurity/36856", "content": "\u203c CVE-2021-44886 \u203c\n\nIn Zammad 5.0.2, agents can configure \"out of office\" periods and substitute persons. If the substitute persons didn't have the same permissions as the original agent, they could receive ticket notifications for tickets that they have no access to.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-04T18:30:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7456136c-43fc-4d3b-848c-d2101d54791a/export"/>
    <published>2022-02-04T18:30:56+00:00</published>
  </entry>
</feed>
