<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 05:09:34 +0000</lastBuildDate>
    <item>
      <title>1612a09f-748e-4863-ae1c-6ae7cb1b353b</title>
      <link>https://db.gcve.eu/sighting/1612a09f-748e-4863-ae1c-6ae7cb1b353b/export</link>
      <description>{"uuid": "1612a09f-748e-4863-ae1c-6ae7cb1b353b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://t.me/cibsecurity/24049", "content": "\u203c CVE-2021-3407 \u203c\n\nA flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-24T02:35:29.000000Z"}</description>
      <content:encoded>{"uuid": "1612a09f-748e-4863-ae1c-6ae7cb1b353b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://t.me/cibsecurity/24049", "content": "\u203c CVE-2021-3407 \u203c\n\nA flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-24T02:35:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1612a09f-748e-4863-ae1c-6ae7cb1b353b/export</guid>
      <pubDate>Wed, 24 Feb 2021 02:35:29 +0000</pubDate>
    </item>
    <item>
      <title>81f50f3b-7eea-4a23-b331-3239b0dcf65e</title>
      <link>https://db.gcve.eu/sighting/81f50f3b-7eea-4a23-b331-3239b0dcf65e/export</link>
      <description>{"uuid": "81f50f3b-7eea-4a23-b331-3239b0dcf65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34073", "type": "seen", "source": "https://t.me/cibsecurity/36469", "content": "\u203c CVE-2021-34073 \u203c\n\nA Cross Site Scripting (XSS) vulnerabilty exists in Sourcecodester Gadget Works Online Ordering System in PHP/MySQLi 1.0 via the Category parameter in an add function in category/index.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T20:21:45.000000Z"}</description>
      <content:encoded>{"uuid": "81f50f3b-7eea-4a23-b331-3239b0dcf65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34073", "type": "seen", "source": "https://t.me/cibsecurity/36469", "content": "\u203c CVE-2021-34073 \u203c\n\nA Cross Site Scripting (XSS) vulnerabilty exists in Sourcecodester Gadget Works Online Ordering System in PHP/MySQLi 1.0 via the Category parameter in an add function in category/index.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T20:21:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/81f50f3b-7eea-4a23-b331-3239b0dcf65e/export</guid>
      <pubDate>Fri, 28 Jan 2022 20:21:45 +0000</pubDate>
    </item>
    <item>
      <title>42c18e59-98d7-4393-973c-3fb3c1ab400a</title>
      <link>https://db.gcve.eu/sighting/42c18e59-98d7-4393-973c-3fb3c1ab400a/export</link>
      <description>{"uuid": "42c18e59-98d7-4393-973c-3fb3c1ab400a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34076", "type": "seen", "source": "https://t.me/cibsecurity/63885", "content": "\u203c CVE-2021-34076 \u203c\n\nFile Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T16:15:30.000000Z"}</description>
      <content:encoded>{"uuid": "42c18e59-98d7-4393-973c-3fb3c1ab400a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34076", "type": "seen", "source": "https://t.me/cibsecurity/63885", "content": "\u203c CVE-2021-34076 \u203c\n\nFile Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T16:15:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/42c18e59-98d7-4393-973c-3fb3c1ab400a/export</guid>
      <pubDate>Thu, 11 May 2023 16:15:30 +0000</pubDate>
    </item>
    <item>
      <title>2f83e1c8-17b6-4e21-a382-853f8db4d5ef</title>
      <link>https://db.gcve.eu/sighting/2f83e1c8-17b6-4e21-a382-853f8db4d5ef/export</link>
      <description>{"uuid": "2f83e1c8-17b6-4e21-a382-853f8db4d5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5f8fdc3f74ca6b1ca4bc23bf7fb17c2e", "content": "", "creation_timestamp": "2025-10-16T10:17:08.000000Z"}</description>
      <content:encoded>{"uuid": "2f83e1c8-17b6-4e21-a382-853f8db4d5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3407", "type": "seen", "source": "https://gist.github.com/Darkcrai86/5f8fdc3f74ca6b1ca4bc23bf7fb17c2e", "content": "", "creation_timestamp": "2025-10-16T10:17:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2f83e1c8-17b6-4e21-a382-853f8db4d5ef/export</guid>
      <pubDate>Thu, 16 Oct 2025 10:17:08 +0000</pubDate>
    </item>
  </channel>
</rss>
