<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 04:18:59 +0000</lastBuildDate>
    <item>
      <title>93a0ec38-bafe-4411-8a43-b0b991f91f08</title>
      <link>https://db.gcve.eu/sighting/93a0ec38-bafe-4411-8a43-b0b991f91f08/export</link>
      <description>{"uuid": "93a0ec38-bafe-4411-8a43-b0b991f91f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21711", "type": "seen", "source": "https://t.me/cibsecurity/36154", "content": "\u203c CVE-2022-21711 \u203c\n\nelfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-24T22:17:46.000000Z"}</description>
      <content:encoded>{"uuid": "93a0ec38-bafe-4411-8a43-b0b991f91f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21711", "type": "seen", "source": "https://t.me/cibsecurity/36154", "content": "\u203c CVE-2022-21711 \u203c\n\nelfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-24T22:17:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/93a0ec38-bafe-4411-8a43-b0b991f91f08/export</guid>
      <pubDate>Mon, 24 Jan 2022 22:17:46 +0000</pubDate>
    </item>
  </channel>
</rss>
