<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 17:16:22 +0000</lastBuildDate>
    <item>
      <title>f932ab4d-b2dd-44da-b15a-5e5e9141872d</title>
      <link>https://db.gcve.eu/sighting/f932ab4d-b2dd-44da-b15a-5e5e9141872d/export</link>
      <description>{"uuid": "f932ab4d-b2dd-44da-b15a-5e5e9141872d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20255", "type": "seen", "source": "https://t.me/cibsecurity/24652", "content": "\u203c CVE-2021-20255 \u203c\n\nA stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T22:52:01.000000Z"}</description>
      <content:encoded>{"uuid": "f932ab4d-b2dd-44da-b15a-5e5e9141872d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20255", "type": "seen", "source": "https://t.me/cibsecurity/24652", "content": "\u203c CVE-2021-20255 \u203c\n\nA stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T22:52:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f932ab4d-b2dd-44da-b15a-5e5e9141872d/export</guid>
      <pubDate>Tue, 09 Mar 2021 22:52:01 +0000</pubDate>
    </item>
    <item>
      <title>cba816d3-4b78-4cb5-8c1c-e9bf8f017183</title>
      <link>https://db.gcve.eu/sighting/cba816d3-4b78-4cb5-8c1c-e9bf8f017183/export</link>
      <description>{"uuid": "cba816d3-4b78-4cb5-8c1c-e9bf8f017183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20257", "type": "seen", "source": "https://t.me/cibsecurity/39039", "content": "\u203c CVE-2021-20257 \u203c\n\nAn infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T17:20:44.000000Z"}</description>
      <content:encoded>{"uuid": "cba816d3-4b78-4cb5-8c1c-e9bf8f017183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20257", "type": "seen", "source": "https://t.me/cibsecurity/39039", "content": "\u203c CVE-2021-20257 \u203c\n\nAn infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T17:20:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cba816d3-4b78-4cb5-8c1c-e9bf8f017183/export</guid>
      <pubDate>Wed, 16 Mar 2022 17:20:44 +0000</pubDate>
    </item>
    <item>
      <title>59ddecc0-9170-4bff-8eef-e1d8e6fc337e</title>
      <link>https://db.gcve.eu/sighting/59ddecc0-9170-4bff-8eef-e1d8e6fc337e/export</link>
      <description>{"uuid": "59ddecc0-9170-4bff-8eef-e1d8e6fc337e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20251", "type": "seen", "source": "https://t.me/cibsecurity/59544", "content": "\u203c CVE-2021-20251 \u203c\n\nA flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:37.000000Z"}</description>
      <content:encoded>{"uuid": "59ddecc0-9170-4bff-8eef-e1d8e6fc337e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20251", "type": "seen", "source": "https://t.me/cibsecurity/59544", "content": "\u203c CVE-2021-20251 \u203c\n\nA flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/59ddecc0-9170-4bff-8eef-e1d8e6fc337e/export</guid>
      <pubDate>Tue, 07 Mar 2023 02:13:37 +0000</pubDate>
    </item>
    <item>
      <title>195c13ed-0cfe-4844-b90d-c86be106b66d</title>
      <link>https://db.gcve.eu/sighting/195c13ed-0cfe-4844-b90d-c86be106b66d/export</link>
      <description>{"uuid": "195c13ed-0cfe-4844-b90d-c86be106b66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20257", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5977", "content": "|       CVE-2021-3569   2.1     https://vulners.com/cve/CVE-2021-3569\n|       CVE-2021-3527   2.1     https://vulners.com/cve/CVE-2021-3527                               |       CVE-2021-3446   2.1     https://vulners.com/cve/CVE-2021-3446                               |       CVE-2021-3416   2.1     https://vulners.com/cve/CVE-2021-3416                               |       CVE-2021-20320  2.1     https://vulners.com/cve/CVE-2021-20320\n|       CVE-2021-20297  2.1     https://vulners.com/cve/CVE-2021-20297                              |       CVE-2021-20257  2.1     https://vulners.com/cve/CVE-2021-20257                              |       CVE-2021-20239  2.1     https://vulners.com/cve/CVE-2021-20239                              |       CVE-2021-20221  2.1     https://vulners.com/cve/CVE-2021-20221\n|       CVE-2020-25743  2.1     https://vulners.com/cve/CVE-2020-25743\n|       CVE-2020-12458  2.1     https://vulners.com/cve/CVE-2020-12458\n|       CVE-2020-10756  2.1     https://vulners.com/cve/CVE-2020-10756\n|       CVE-2019-18391  2.1     https://vulners.com/cve/CVE-2019-18391\n|       CVE-2019-14826  2.1     https://vulners.com/cve/CVE-2019-14826\n|       CVE-2019-13313  2.1     https://vulners.com/cve/CVE-2019-13313                              |       CVE-2019-12067  2.1     https://vulners.com/cve/CVE-2019-12067                              |       CVE-2019-11884  2.1     https://vulners.com/cve/CVE-2019-11884                              |       CVE-2019-11833  2.1     https://vulners.com/cve/CVE-2019-11833                              |       CVE-2019-11135  2.1     https://vulners.com/cve/CVE-2019-11135                              |       CVE-2019-10183  2.1     https://vulners.com/cve/CVE-2019-10183                              |       CVE-2018-16878  2.1     https://vulners.com/cve/CVE-2018-16878                              |       CVE-2004-0554   2.1     https://vulners.com/cve/CVE-2004-0554                               |       1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    2.1       https://vulners.com/githubexploit/1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    *EXPLOIT*\n|       CVE-2023-1289   1.9     https://vulners.com/cve/CVE-2023-1289\n|       CVE-2022-25310  1.9     https://vulners.com/cve/CVE-2022-25310                              |       CVE-2022-25309  1.9     https://vulners.com/cve/CVE-2022-25309                              |       CVE-2021-4217   1.9     https://vulners.com/cve/CVE-2021-4217                               |       CVE-2021-3753   1.9     https://vulners.com/cve/CVE-2021-3753                               |       CVE-2021-3602   1.9     https://vulners.com/cve/CVE-2021-3602                               |       CVE-2020-25656  1.9     https://vulners.com/cve/CVE-2020-25656                              |       CVE-2019-2634   1.9     https://vulners.com/cve/CVE-2019-2634                               |       CVE-2019-2535   1.9     https://vulners.com/cve/CVE-2019-2535                               |       CVE-2019-18660  1.9     https://vulners.com/cve/CVE-2019-18660\n|       PRION:CVE-2023-22024    1.7     https://vulners.com/prion/PRION:CVE-2023-22024\n|       CVE-2023-3161   1.7     https://vulners.com/cve/CVE-2023-3161\n|       CVE-2023-28328  1.7     https://vulners.com/cve/CVE-2023-28328\n|       CVE-2023-28327  1.7     https://vulners.com/cve/CVE-2023-28327\n|       CVE-2023-2700   1.7     https://vulners.com/cve/CVE-2023-2700\n|       CVE-2023-2602   1.7     https://vulners.com/cve/CVE-2023-2602\n|       CVE-2023-1981   1.7     https://vulners.com/cve/CVE-2023-1981\n|       CVE-2023-1095   1.7     https://vulners.com/cve/CVE-2023-1095                               |       CVE-2022-2153   1.7     https://vulners.com/cve/CVE-2022-2153\n|       CVE-2022-1263   1.7     https://vulners.com/cve/CVE-2022-1263", "creation_timestamp": "2023-11-15T16:53:03.000000Z"}</description>
      <content:encoded>{"uuid": "195c13ed-0cfe-4844-b90d-c86be106b66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20257", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5977", "content": "|       CVE-2021-3569   2.1     https://vulners.com/cve/CVE-2021-3569\n|       CVE-2021-3527   2.1     https://vulners.com/cve/CVE-2021-3527                               |       CVE-2021-3446   2.1     https://vulners.com/cve/CVE-2021-3446                               |       CVE-2021-3416   2.1     https://vulners.com/cve/CVE-2021-3416                               |       CVE-2021-20320  2.1     https://vulners.com/cve/CVE-2021-20320\n|       CVE-2021-20297  2.1     https://vulners.com/cve/CVE-2021-20297                              |       CVE-2021-20257  2.1     https://vulners.com/cve/CVE-2021-20257                              |       CVE-2021-20239  2.1     https://vulners.com/cve/CVE-2021-20239                              |       CVE-2021-20221  2.1     https://vulners.com/cve/CVE-2021-20221\n|       CVE-2020-25743  2.1     https://vulners.com/cve/CVE-2020-25743\n|       CVE-2020-12458  2.1     https://vulners.com/cve/CVE-2020-12458\n|       CVE-2020-10756  2.1     https://vulners.com/cve/CVE-2020-10756\n|       CVE-2019-18391  2.1     https://vulners.com/cve/CVE-2019-18391\n|       CVE-2019-14826  2.1     https://vulners.com/cve/CVE-2019-14826\n|       CVE-2019-13313  2.1     https://vulners.com/cve/CVE-2019-13313                              |       CVE-2019-12067  2.1     https://vulners.com/cve/CVE-2019-12067                              |       CVE-2019-11884  2.1     https://vulners.com/cve/CVE-2019-11884                              |       CVE-2019-11833  2.1     https://vulners.com/cve/CVE-2019-11833                              |       CVE-2019-11135  2.1     https://vulners.com/cve/CVE-2019-11135                              |       CVE-2019-10183  2.1     https://vulners.com/cve/CVE-2019-10183                              |       CVE-2018-16878  2.1     https://vulners.com/cve/CVE-2018-16878                              |       CVE-2004-0554   2.1     https://vulners.com/cve/CVE-2004-0554                               |       1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    2.1       https://vulners.com/githubexploit/1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    *EXPLOIT*\n|       CVE-2023-1289   1.9     https://vulners.com/cve/CVE-2023-1289\n|       CVE-2022-25310  1.9     https://vulners.com/cve/CVE-2022-25310                              |       CVE-2022-25309  1.9     https://vulners.com/cve/CVE-2022-25309                              |       CVE-2021-4217   1.9     https://vulners.com/cve/CVE-2021-4217                               |       CVE-2021-3753   1.9     https://vulners.com/cve/CVE-2021-3753                               |       CVE-2021-3602   1.9     https://vulners.com/cve/CVE-2021-3602                               |       CVE-2020-25656  1.9     https://vulners.com/cve/CVE-2020-25656                              |       CVE-2019-2634   1.9     https://vulners.com/cve/CVE-2019-2634                               |       CVE-2019-2535   1.9     https://vulners.com/cve/CVE-2019-2535                               |       CVE-2019-18660  1.9     https://vulners.com/cve/CVE-2019-18660\n|       PRION:CVE-2023-22024    1.7     https://vulners.com/prion/PRION:CVE-2023-22024\n|       CVE-2023-3161   1.7     https://vulners.com/cve/CVE-2023-3161\n|       CVE-2023-28328  1.7     https://vulners.com/cve/CVE-2023-28328\n|       CVE-2023-28327  1.7     https://vulners.com/cve/CVE-2023-28327\n|       CVE-2023-2700   1.7     https://vulners.com/cve/CVE-2023-2700\n|       CVE-2023-2602   1.7     https://vulners.com/cve/CVE-2023-2602\n|       CVE-2023-1981   1.7     https://vulners.com/cve/CVE-2023-1981\n|       CVE-2023-1095   1.7     https://vulners.com/cve/CVE-2023-1095                               |       CVE-2022-2153   1.7     https://vulners.com/cve/CVE-2022-2153\n|       CVE-2022-1263   1.7     https://vulners.com/cve/CVE-2022-1263", "creation_timestamp": "2023-11-15T16:53:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/195c13ed-0cfe-4844-b90d-c86be106b66d/export</guid>
      <pubDate>Wed, 15 Nov 2023 16:53:03 +0000</pubDate>
    </item>
    <item>
      <title>a984f504-446d-460c-853d-162d1a0eed59</title>
      <link>https://db.gcve.eu/sighting/a984f504-446d-460c-853d-162d1a0eed59/export</link>
      <description>{"uuid": "a984f504-446d-460c-853d-162d1a0eed59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1584", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2023-11-26T06:00:26.000000Z"}</description>
      <content:encoded>{"uuid": "a984f504-446d-460c-853d-162d1a0eed59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1584", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2023-11-26T06:00:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a984f504-446d-460c-853d-162d1a0eed59/export</guid>
      <pubDate>Sun, 26 Nov 2023 06:00:26 +0000</pubDate>
    </item>
    <item>
      <title>255959dc-2745-4188-ba90-33df42247e2f</title>
      <link>https://db.gcve.eu/sighting/255959dc-2745-4188-ba90-33df42247e2f/export</link>
      <description>{"uuid": "255959dc-2745-4188-ba90-33df42247e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3598", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2023-11-26T06:03:23.000000Z"}</description>
      <content:encoded>{"uuid": "255959dc-2745-4188-ba90-33df42247e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3598", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2023-11-26T06:03:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/255959dc-2745-4188-ba90-33df42247e2f/export</guid>
      <pubDate>Sun, 26 Nov 2023 06:03:23 +0000</pubDate>
    </item>
    <item>
      <title>c3e30d1c-a20d-4310-8528-cddc93ef64bb</title>
      <link>https://db.gcve.eu/sighting/c3e30d1c-a20d-4310-8528-cddc93ef64bb/export</link>
      <description>{"uuid": "c3e30d1c-a20d-4310-8528-cddc93ef64bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9465", "content": "#exploit\n1. CVE-2023-26269:\nMisconfigured JMX in Apache James\nhttps://github.com/mbadanoiu/CVE-2023-26269\n\n2. CVE-2023-34468:\nRCE via DB Components in Apache NiFi\nhttps://github.com/mbadanoiu/CVE-2023-34468\n\n3. CVE-2021-20253:\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\nhttps://github.com/mbadanoiu/CVE-2021-20253", "creation_timestamp": "2023-11-26T12:45:59.000000Z"}</description>
      <content:encoded>{"uuid": "c3e30d1c-a20d-4310-8528-cddc93ef64bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9465", "content": "#exploit\n1. CVE-2023-26269:\nMisconfigured JMX in Apache James\nhttps://github.com/mbadanoiu/CVE-2023-26269\n\n2. CVE-2023-34468:\nRCE via DB Components in Apache NiFi\nhttps://github.com/mbadanoiu/CVE-2023-34468\n\n3. CVE-2021-20253:\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\nhttps://github.com/mbadanoiu/CVE-2021-20253", "creation_timestamp": "2023-11-26T12:45:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c3e30d1c-a20d-4310-8528-cddc93ef64bb/export</guid>
      <pubDate>Sun, 26 Nov 2023 12:45:59 +0000</pubDate>
    </item>
    <item>
      <title>9df12578-980f-47d3-b916-d76305e9d04e</title>
      <link>https://db.gcve.eu/sighting/9df12578-980f-47d3-b916-d76305e9d04e/export</link>
      <description>{"uuid": "9df12578-980f-47d3-b916-d76305e9d04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2105", "content": "#exploit\n1. CVE-2023-26269:\nMisconfigured JMX in Apache James\nhttps://github.com/mbadanoiu/CVE-2023-26269\n\n2. CVE-2023-34468:\nRCE via DB Components in Apache NiFi\nhttps://github.com/mbadanoiu/CVE-2023-34468\n\n3. CVE-2021-20253:\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\nhttps://github.com/mbadanoiu/CVE-2021-20253", "creation_timestamp": "2024-08-16T08:52:58.000000Z"}</description>
      <content:encoded>{"uuid": "9df12578-980f-47d3-b916-d76305e9d04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2105", "content": "#exploit\n1. CVE-2023-26269:\nMisconfigured JMX in Apache James\nhttps://github.com/mbadanoiu/CVE-2023-26269\n\n2. CVE-2023-34468:\nRCE via DB Components in Apache NiFi\nhttps://github.com/mbadanoiu/CVE-2023-34468\n\n3. CVE-2021-20253:\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\nhttps://github.com/mbadanoiu/CVE-2021-20253", "creation_timestamp": "2024-08-16T08:52:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9df12578-980f-47d3-b916-d76305e9d04e/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:52:58 +0000</pubDate>
    </item>
    <item>
      <title>91a2850e-8adb-45b4-a350-65aacc1849b3</title>
      <link>https://db.gcve.eu/sighting/91a2850e-8adb-45b4-a350-65aacc1849b3/export</link>
      <description>{"uuid": "91a2850e-8adb-45b4-a350-65aacc1849b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2109", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2024-08-16T08:52:59.000000Z"}</description>
      <content:encoded>{"uuid": "91a2850e-8adb-45b4-a350-65aacc1849b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20253", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2109", "content": "https://github.com/mbadanoiu/CVE-2021-20253\nPrivilege Escalation via Job Isolation Escape in Ansible Tower\n#github", "creation_timestamp": "2024-08-16T08:52:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/91a2850e-8adb-45b4-a350-65aacc1849b3/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:52:59 +0000</pubDate>
    </item>
    <item>
      <title>538db1ad-40be-4489-8922-e4b9f102dad1</title>
      <link>https://db.gcve.eu/sighting/538db1ad-40be-4489-8922-e4b9f102dad1/export</link>
      <description>{"uuid": "538db1ad-40be-4489-8922-e4b9f102dad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-20255", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "538db1ad-40be-4489-8922-e4b9f102dad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-20255", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/538db1ad-40be-4489-8922-e4b9f102dad1/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
