<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:51:35 +0000</lastBuildDate>
    <item>
      <title>ec3f8690-a67e-4be3-b8b3-4910edd4d8ca</title>
      <link>https://db.gcve.eu/sighting/ec3f8690-a67e-4be3-b8b3-4910edd4d8ca/export</link>
      <description>{"uuid": "ec3f8690-a67e-4be3-b8b3-4910edd4d8ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0256", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3163", "content": "#Threat_Research\n1. CVE-2021-0256:\nJuniper Junos OS LPE vulnerability in mosquitto\nhttps://starlabs.sg/advisories/21-0256\n2. CVE-2021-23133:\nLinux kernel: race condition in sctp sockets\nhttps://www.openwall.com/lists/oss-security/2021/04/18/2\n3. Remove any Facebook\u2019s live video (PoC)\nhttps://medium.com/@edmundaa222/poc-remove-any-facebooks-live-video-14-000-bounty-70c8135b7b4c", "creation_timestamp": "2021-04-19T12:07:01.000000Z"}</description>
      <content:encoded>{"uuid": "ec3f8690-a67e-4be3-b8b3-4910edd4d8ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0256", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3163", "content": "#Threat_Research\n1. CVE-2021-0256:\nJuniper Junos OS LPE vulnerability in mosquitto\nhttps://starlabs.sg/advisories/21-0256\n2. CVE-2021-23133:\nLinux kernel: race condition in sctp sockets\nhttps://www.openwall.com/lists/oss-security/2021/04/18/2\n3. Remove any Facebook\u2019s live video (PoC)\nhttps://medium.com/@edmundaa222/poc-remove-any-facebooks-live-video-14-000-bounty-70c8135b7b4c", "creation_timestamp": "2021-04-19T12:07:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ec3f8690-a67e-4be3-b8b3-4910edd4d8ca/export</guid>
      <pubDate>Mon, 19 Apr 2021 12:07:01 +0000</pubDate>
    </item>
    <item>
      <title>c44e72bb-b53b-4457-8c11-bcac408d6296</title>
      <link>https://db.gcve.eu/sighting/c44e72bb-b53b-4457-8c11-bcac408d6296/export</link>
      <description>{"uuid": "c44e72bb-b53b-4457-8c11-bcac408d6296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0256", "type": "seen", "source": "https://t.me/arpsyndicate/709", "content": "#ExploitObserverAlert\n\nCVE-2021-0256\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0256. A sensitive information disclosure vulnerability in the mosquitto message broker of Juniper Networks Junos OS may allow a locally authenticated user with shell access the ability to read portions of sensitive files, such as the master.passwd file. Since mosquitto is shipped with setuid permissions enabled and is owned by the root user, this vulnerability may allow a local privileged user the ability to run mosquitto with root privileges and access sensitive information stored on the local filesystem. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S12, 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.3 versions prior to 18.3R3-S4; 19.1 versions prior to 19.1R3-S4; 19.3 versions prior to 19.3R3-S1, 19.3R3-S2; 19.4 versions prior to 19.4R2-S3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3, 20.2R2, 20.2R3.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-11-29T09:28:04.000000Z"}</description>
      <content:encoded>{"uuid": "c44e72bb-b53b-4457-8c11-bcac408d6296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0256", "type": "seen", "source": "https://t.me/arpsyndicate/709", "content": "#ExploitObserverAlert\n\nCVE-2021-0256\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0256. A sensitive information disclosure vulnerability in the mosquitto message broker of Juniper Networks Junos OS may allow a locally authenticated user with shell access the ability to read portions of sensitive files, such as the master.passwd file. Since mosquitto is shipped with setuid permissions enabled and is owned by the root user, this vulnerability may allow a local privileged user the ability to run mosquitto with root privileges and access sensitive information stored on the local filesystem. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S12, 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.3 versions prior to 18.3R3-S4; 19.1 versions prior to 19.1R3-S4; 19.3 versions prior to 19.3R3-S1, 19.3R3-S2; 19.4 versions prior to 19.4R2-S3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3, 20.2R2, 20.2R3.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-11-29T09:28:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c44e72bb-b53b-4457-8c11-bcac408d6296/export</guid>
      <pubDate>Wed, 29 Nov 2023 09:28:04 +0000</pubDate>
    </item>
  </channel>
</rss>
