<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 14:46:04 +0000</lastBuildDate>
    <item>
      <title>b90184d8-88cb-4bb8-ad67-b20502fb0505</title>
      <link>https://db.gcve.eu/sighting/b90184d8-88cb-4bb8-ad67-b20502fb0505/export</link>
      <description>{"uuid": "b90184d8-88cb-4bb8-ad67-b20502fb0505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3182", "type": "seen", "source": "https://t.me/cibsecurity/22268", "content": "\u203c CVE-2021-3182 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-19T18:56:05.000000Z"}</description>
      <content:encoded>{"uuid": "b90184d8-88cb-4bb8-ad67-b20502fb0505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3182", "type": "seen", "source": "https://t.me/cibsecurity/22268", "content": "\u203c CVE-2021-3182 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-19T18:56:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b90184d8-88cb-4bb8-ad67-b20502fb0505/export</guid>
      <pubDate>Tue, 19 Jan 2021 18:56:05 +0000</pubDate>
    </item>
    <item>
      <title>51c84cf3-8ef0-4cc1-bfcd-174baf1ed712</title>
      <link>https://db.gcve.eu/sighting/51c84cf3-8ef0-4cc1-bfcd-174baf1ed712/export</link>
      <description>{"uuid": "51c84cf3-8ef0-4cc1-bfcd-174baf1ed712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "Telegram/r-7YQxAfvosWTOr1K8eBhRRQgWXHvVBAJhQ8hcA6wiwgrrM", "content": "", "creation_timestamp": "2021-05-07T17:46:42.000000Z"}</description>
      <content:encoded>{"uuid": "51c84cf3-8ef0-4cc1-bfcd-174baf1ed712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "Telegram/r-7YQxAfvosWTOr1K8eBhRRQgWXHvVBAJhQ8hcA6wiwgrrM", "content": "", "creation_timestamp": "2021-05-07T17:46:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/51c84cf3-8ef0-4cc1-bfcd-174baf1ed712/export</guid>
      <pubDate>Fri, 07 May 2021 17:46:42 +0000</pubDate>
    </item>
    <item>
      <title>6f365a19-28b8-4740-a44b-4d367558364b</title>
      <link>https://db.gcve.eu/sighting/6f365a19-28b8-4740-a44b-4d367558364b/export</link>
      <description>{"uuid": "6f365a19-28b8-4740-a44b-4d367558364b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31829", "type": "published-proof-of-concept", "source": "Telegram/5Xahx5s1HhKdN4WjLEOJkICHXeU47VdBG4ybsFceuenzTxY", "content": "", "creation_timestamp": "2021-05-07T17:47:02.000000Z"}</description>
      <content:encoded>{"uuid": "6f365a19-28b8-4740-a44b-4d367558364b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31829", "type": "published-proof-of-concept", "source": "Telegram/5Xahx5s1HhKdN4WjLEOJkICHXeU47VdBG4ybsFceuenzTxY", "content": "", "creation_timestamp": "2021-05-07T17:47:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6f365a19-28b8-4740-a44b-4d367558364b/export</guid>
      <pubDate>Fri, 07 May 2021 17:47:02 +0000</pubDate>
    </item>
    <item>
      <title>7144e630-fd88-4db9-b3f8-dc2be5a4b458</title>
      <link>https://db.gcve.eu/sighting/7144e630-fd88-4db9-b3f8-dc2be5a4b458/export</link>
      <description>{"uuid": "7144e630-fd88-4db9-b3f8-dc2be5a4b458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3350", "content": "#Threat_Research\nSSRF in Open Distro for Elasticsearch\n(PoC for CVE-2021-31828)\nhttps://rotem-bar.com/ssrf-in-open-distro-for-elasticsearch-cve-2021-31828", "creation_timestamp": "2021-05-12T11:01:55.000000Z"}</description>
      <content:encoded>{"uuid": "7144e630-fd88-4db9-b3f8-dc2be5a4b458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31828", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3350", "content": "#Threat_Research\nSSRF in Open Distro for Elasticsearch\n(PoC for CVE-2021-31828)\nhttps://rotem-bar.com/ssrf-in-open-distro-for-elasticsearch-cve-2021-31828", "creation_timestamp": "2021-05-12T11:01:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7144e630-fd88-4db9-b3f8-dc2be5a4b458/export</guid>
      <pubDate>Wed, 12 May 2021 11:01:55 +0000</pubDate>
    </item>
    <item>
      <title>38e402d2-9732-4462-8164-d1e05f0f618c</title>
      <link>https://db.gcve.eu/sighting/38e402d2-9732-4462-8164-d1e05f0f618c/export</link>
      <description>{"uuid": "38e402d2-9732-4462-8164-d1e05f0f618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31820", "type": "seen", "source": "https://t.me/cibsecurity/27498", "content": "\u203c CVE-2021-31820 \u203c\n\nIn Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T14:16:42.000000Z"}</description>
      <content:encoded>{"uuid": "38e402d2-9732-4462-8164-d1e05f0f618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31820", "type": "seen", "source": "https://t.me/cibsecurity/27498", "content": "\u203c CVE-2021-31820 \u203c\n\nIn Octopus Server after version 2018.8.2 if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T14:16:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/38e402d2-9732-4462-8164-d1e05f0f618c/export</guid>
      <pubDate>Wed, 18 Aug 2021 14:16:42 +0000</pubDate>
    </item>
    <item>
      <title>e37d9faa-a909-4b52-95d7-639e259762e5</title>
      <link>https://db.gcve.eu/sighting/e37d9faa-a909-4b52-95d7-639e259762e5/export</link>
      <description>{"uuid": "e37d9faa-a909-4b52-95d7-639e259762e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31822", "type": "seen", "source": "https://t.me/cibsecurity/32955", "content": "\u203c CVE-2021-31822 \u203c\n\nWhen Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-24T18:27:11.000000Z"}</description>
      <content:encoded>{"uuid": "e37d9faa-a909-4b52-95d7-639e259762e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31822", "type": "seen", "source": "https://t.me/cibsecurity/32955", "content": "\u203c CVE-2021-31822 \u203c\n\nWhen Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-24T18:27:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e37d9faa-a909-4b52-95d7-639e259762e5/export</guid>
      <pubDate>Wed, 24 Nov 2021 18:27:11 +0000</pubDate>
    </item>
    <item>
      <title>4d0bfa3a-b259-41fa-be94-63cd0f9842da</title>
      <link>https://db.gcve.eu/sighting/4d0bfa3a-b259-41fa-be94-63cd0f9842da/export</link>
      <description>{"uuid": "4d0bfa3a-b259-41fa-be94-63cd0f9842da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31821", "type": "seen", "source": "https://t.me/cibsecurity/35775", "content": "\u203c CVE-2021-31821 \u203c\n\nWhen the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-19T12:25:40.000000Z"}</description>
      <content:encoded>{"uuid": "4d0bfa3a-b259-41fa-be94-63cd0f9842da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31821", "type": "seen", "source": "https://t.me/cibsecurity/35775", "content": "\u203c CVE-2021-31821 \u203c\n\nWhen the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-19T12:25:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4d0bfa3a-b259-41fa-be94-63cd0f9842da/export</guid>
      <pubDate>Wed, 19 Jan 2022 12:25:40 +0000</pubDate>
    </item>
  </channel>
</rss>
