<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 20:45:03 +0000</lastBuildDate>
    <item>
      <title>3d56faf8-d204-49f4-afb1-91f9f5a918d5</title>
      <link>https://db.gcve.eu/sighting/3d56faf8-d204-49f4-afb1-91f9f5a918d5/export</link>
      <description>{"uuid": "3d56faf8-d204-49f4-afb1-91f9f5a918d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44453", "type": "seen", "source": "https://t.me/cibsecurity/34594", "content": "\u203c CVE-2021-44453 \u203c\n\nmySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T22:19:52.000000Z"}</description>
      <content:encoded>{"uuid": "3d56faf8-d204-49f4-afb1-91f9f5a918d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44453", "type": "seen", "source": "https://t.me/cibsecurity/34594", "content": "\u203c CVE-2021-44453 \u203c\n\nmySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T22:19:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3d56faf8-d204-49f4-afb1-91f9f5a918d5/export</guid>
      <pubDate>Thu, 23 Dec 2021 22:19:52 +0000</pubDate>
    </item>
    <item>
      <title>c96cd72d-2f97-4938-bd40-71807b6a644c</title>
      <link>https://db.gcve.eu/sighting/c96cd72d-2f97-4938-bd40-71807b6a644c/export</link>
      <description>{"uuid": "c96cd72d-2f97-4938-bd40-71807b6a644c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44458", "type": "seen", "source": "https://t.me/cibsecurity/35185", "content": "\u203c CVE-2021-44458 \u203c\n\nLinux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-10T18:14:54.000000Z"}</description>
      <content:encoded>{"uuid": "c96cd72d-2f97-4938-bd40-71807b6a644c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44458", "type": "seen", "source": "https://t.me/cibsecurity/35185", "content": "\u203c CVE-2021-44458 \u203c\n\nLinux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-10T18:14:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c96cd72d-2f97-4938-bd40-71807b6a644c/export</guid>
      <pubDate>Mon, 10 Jan 2022 18:14:54 +0000</pubDate>
    </item>
    <item>
      <title>20097e64-a324-444e-92e6-4e38142b70aa</title>
      <link>https://db.gcve.eu/sighting/20097e64-a324-444e-92e6-4e38142b70aa/export</link>
      <description>{"uuid": "20097e64-a324-444e-92e6-4e38142b70aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4445", "type": "seen", "source": "Telegram/ttj-MM_VSWER8csXt1ZTV-yIb5dsny16M_jFz63eaYMFVXgb", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}</description>
      <content:encoded>{"uuid": "20097e64-a324-444e-92e6-4e38142b70aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4445", "type": "seen", "source": "Telegram/ttj-MM_VSWER8csXt1ZTV-yIb5dsny16M_jFz63eaYMFVXgb", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/20097e64-a324-444e-92e6-4e38142b70aa/export</guid>
      <pubDate>Sat, 08 Mar 2025 04:34:11 +0000</pubDate>
    </item>
  </channel>
</rss>
