<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 17:23:52 +0000</lastBuildDate>
    <item>
      <title>10f7028a-b65e-4149-a62f-2942bd5a42cd</title>
      <link>https://db.gcve.eu/sighting/10f7028a-b65e-4149-a62f-2942bd5a42cd/export</link>
      <description>{"uuid": "10f7028a-b65e-4149-a62f-2942bd5a42cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2034", "type": "seen", "source": "https://t.me/cibsecurity/22340", "content": "\u203c CVE-2021-2034 \u203c\n\nVulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T18:27:19.000000Z"}</description>
      <content:encoded>{"uuid": "10f7028a-b65e-4149-a62f-2942bd5a42cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2034", "type": "seen", "source": "https://t.me/cibsecurity/22340", "content": "\u203c CVE-2021-2034 \u203c\n\nVulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T18:27:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/10f7028a-b65e-4149-a62f-2942bd5a42cd/export</guid>
      <pubDate>Wed, 20 Jan 2021 18:27:19 +0000</pubDate>
    </item>
    <item>
      <title>d7981a1e-dc5c-4797-bf2b-18885961d5e5</title>
      <link>https://db.gcve.eu/sighting/d7981a1e-dc5c-4797-bf2b-18885961d5e5/export</link>
      <description>{"uuid": "d7981a1e-dc5c-4797-bf2b-18885961d5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20341", "type": "seen", "source": "https://t.me/cibsecurity/24603", "content": "\u203c CVE-2021-20341 \u203c\n\nIBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T18:51:44.000000Z"}</description>
      <content:encoded>{"uuid": "d7981a1e-dc5c-4797-bf2b-18885961d5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20341", "type": "seen", "source": "https://t.me/cibsecurity/24603", "content": "\u203c CVE-2021-20341 \u203c\n\nIBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T18:51:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d7981a1e-dc5c-4797-bf2b-18885961d5e5/export</guid>
      <pubDate>Tue, 09 Mar 2021 18:51:44 +0000</pubDate>
    </item>
    <item>
      <title>3d54ee7c-72a9-4664-87d4-7af680e92708</title>
      <link>https://db.gcve.eu/sighting/3d54ee7c-72a9-4664-87d4-7af680e92708/export</link>
      <description>{"uuid": "3d54ee7c-72a9-4664-87d4-7af680e92708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20349", "type": "seen", "source": "https://t.me/cibsecurity/27021", "content": "\u203c CVE-2021-20349 \u203c\n\nIBM Tivoli Workload Scheduler 9.4 and 9.5 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 194599.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T20:37:11.000000Z"}</description>
      <content:encoded>{"uuid": "3d54ee7c-72a9-4664-87d4-7af680e92708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20349", "type": "seen", "source": "https://t.me/cibsecurity/27021", "content": "\u203c CVE-2021-20349 \u203c\n\nIBM Tivoli Workload Scheduler 9.4 and 9.5 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 194599.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T20:37:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3d54ee7c-72a9-4664-87d4-7af680e92708/export</guid>
      <pubDate>Mon, 09 Aug 2021 20:37:11 +0000</pubDate>
    </item>
  </channel>
</rss>
