<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 16:31:15 +0000</lastBuildDate>
    <item>
      <title>b42ffde2-86b9-400c-9de4-ea9a8973d79d</title>
      <link>https://db.gcve.eu/sighting/b42ffde2-86b9-400c-9de4-ea9a8973d79d/export</link>
      <description>{"uuid": "b42ffde2-86b9-400c-9de4-ea9a8973d79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2043", "type": "seen", "source": "https://t.me/cibsecurity/22382", "content": "\u203c CVE-2021-2043 \u203c\n\nVulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T18:37:35.000000Z"}</description>
      <content:encoded>{"uuid": "b42ffde2-86b9-400c-9de4-ea9a8973d79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2043", "type": "seen", "source": "https://t.me/cibsecurity/22382", "content": "\u203c CVE-2021-2043 \u203c\n\nVulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T18:37:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b42ffde2-86b9-400c-9de4-ea9a8973d79d/export</guid>
      <pubDate>Wed, 20 Jan 2021 18:37:35 +0000</pubDate>
    </item>
    <item>
      <title>2ad3b9e0-9f5d-40b8-a2ac-5dd84da0da20</title>
      <link>https://db.gcve.eu/sighting/2ad3b9e0-9f5d-40b8-a2ac-5dd84da0da20/export</link>
      <description>{"uuid": "2ad3b9e0-9f5d-40b8-a2ac-5dd84da0da20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20431", "type": "seen", "source": "https://t.me/cibsecurity/26477", "content": "\u203c CVE-2021-20431 \u203c\n\nIBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an attacker to obtain sensitive information from the system. IBM X-Force ID: 196342.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T16:11:18.000000Z"}</description>
      <content:encoded>{"uuid": "2ad3b9e0-9f5d-40b8-a2ac-5dd84da0da20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20431", "type": "seen", "source": "https://t.me/cibsecurity/26477", "content": "\u203c CVE-2021-20431 \u203c\n\nIBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an attacker to obtain sensitive information from the system. IBM X-Force ID: 196342.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T16:11:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2ad3b9e0-9f5d-40b8-a2ac-5dd84da0da20/export</guid>
      <pubDate>Mon, 26 Jul 2021 16:11:18 +0000</pubDate>
    </item>
    <item>
      <title>6f951d91-fc8f-429c-9270-b48a39de55c9</title>
      <link>https://db.gcve.eu/sighting/6f951d91-fc8f-429c-9270-b48a39de55c9/export</link>
      <description>{"uuid": "6f951d91-fc8f-429c-9270-b48a39de55c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20430", "type": "seen", "source": "https://t.me/cibsecurity/26482", "content": "\u203c CVE-2021-20430 \u203c\n\nIBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196341.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T16:11:26.000000Z"}</description>
      <content:encoded>{"uuid": "6f951d91-fc8f-429c-9270-b48a39de55c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20430", "type": "seen", "source": "https://t.me/cibsecurity/26482", "content": "\u203c CVE-2021-20430 \u203c\n\nIBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196341.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-26T16:11:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6f951d91-fc8f-429c-9270-b48a39de55c9/export</guid>
      <pubDate>Mon, 26 Jul 2021 16:11:26 +0000</pubDate>
    </item>
    <item>
      <title>c82a4140-60d8-4c49-a17c-33f00eb483cc</title>
      <link>https://db.gcve.eu/sighting/c82a4140-60d8-4c49-a17c-33f00eb483cc/export</link>
      <description>{"uuid": "c82a4140-60d8-4c49-a17c-33f00eb483cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20435", "type": "seen", "source": "https://t.me/cibsecurity/29330", "content": "\u203c CVE-2021-20435 \u203c\n\nIBM Security Verify Bridge 1.0.5.0 does not properly validate a certificate which could allow a local attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 196355.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T20:30:06.000000Z"}</description>
      <content:encoded>{"uuid": "c82a4140-60d8-4c49-a17c-33f00eb483cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20435", "type": "seen", "source": "https://t.me/cibsecurity/29330", "content": "\u203c CVE-2021-20435 \u203c\n\nIBM Security Verify Bridge 1.0.5.0 does not properly validate a certificate which could allow a local attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 196355.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T20:30:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c82a4140-60d8-4c49-a17c-33f00eb483cc/export</guid>
      <pubDate>Thu, 23 Sep 2021 20:30:06 +0000</pubDate>
    </item>
    <item>
      <title>b5ee1adc-28bf-4735-a29c-8ae3d8a6a31e</title>
      <link>https://db.gcve.eu/sighting/b5ee1adc-28bf-4735-a29c-8ae3d8a6a31e/export</link>
      <description>{"uuid": "b5ee1adc-28bf-4735-a29c-8ae3d8a6a31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20434", "type": "seen", "source": "https://t.me/cibsecurity/29336", "content": "\u203c CVE-2021-20434 \u203c\n\nIBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 196346.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T20:30:23.000000Z"}</description>
      <content:encoded>{"uuid": "b5ee1adc-28bf-4735-a29c-8ae3d8a6a31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20434", "type": "seen", "source": "https://t.me/cibsecurity/29336", "content": "\u203c CVE-2021-20434 \u203c\n\nIBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 196346.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T20:30:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b5ee1adc-28bf-4735-a29c-8ae3d8a6a31e/export</guid>
      <pubDate>Thu, 23 Sep 2021 20:30:23 +0000</pubDate>
    </item>
  </channel>
</rss>
