<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 00:12:24 +0000</lastBuildDate>
    <item>
      <title>64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64</title>
      <link>https://db.gcve.eu/sighting/64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64/export</link>
      <description>{"uuid": "64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23929", "type": "seen", "source": "https://t.me/cibsecurity/22052", "content": "\u203c CVE-2021-23929 \u203c\n\nOX App Suite through 7.10.4 allows XSS via a crafted Content-Disposition header in an uploaded HTML document to an ajax/share/?delivery=view URI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:13.000000Z"}</description>
      <content:encoded>{"uuid": "64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23929", "type": "seen", "source": "https://t.me/cibsecurity/22052", "content": "\u203c CVE-2021-23929 \u203c\n\nOX App Suite through 7.10.4 allows XSS via a crafted Content-Disposition header in an uploaded HTML document to an ajax/share/?delivery=view URI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/64cc593a-26c7-4bcf-ba4f-8fe52ec6fc64/export</guid>
      <pubDate>Wed, 13 Jan 2021 00:47:13 +0000</pubDate>
    </item>
    <item>
      <title>2293f303-7f62-4fc2-9087-df074490544c</title>
      <link>https://db.gcve.eu/sighting/2293f303-7f62-4fc2-9087-df074490544c/export</link>
      <description>{"uuid": "2293f303-7f62-4fc2-9087-df074490544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23927", "type": "seen", "source": "https://t.me/cibsecurity/22068", "content": "\u203c CVE-2021-23927 \u203c\n\nOX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:30.000000Z"}</description>
      <content:encoded>{"uuid": "2293f303-7f62-4fc2-9087-df074490544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23927", "type": "seen", "source": "https://t.me/cibsecurity/22068", "content": "\u203c CVE-2021-23927 \u203c\n\nOX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-13T00:47:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2293f303-7f62-4fc2-9087-df074490544c/export</guid>
      <pubDate>Wed, 13 Jan 2021 00:47:30 +0000</pubDate>
    </item>
    <item>
      <title>5a201cdb-808a-491b-a3ac-7ff4d4b634c6</title>
      <link>https://db.gcve.eu/sighting/5a201cdb-808a-491b-a3ac-7ff4d4b634c6/export</link>
      <description>{"uuid": "5a201cdb-808a-491b-a3ac-7ff4d4b634c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://t.me/cibsecurity/22165", "content": "\u203c CVE-2021-23926 \u203c\n\nThe XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:46.000000Z"}</description>
      <content:encoded>{"uuid": "5a201cdb-808a-491b-a3ac-7ff4d4b634c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://t.me/cibsecurity/22165", "content": "\u203c CVE-2021-23926 \u203c\n\nThe XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-14T18:49:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5a201cdb-808a-491b-a3ac-7ff4d4b634c6/export</guid>
      <pubDate>Thu, 14 Jan 2021 18:49:46 +0000</pubDate>
    </item>
    <item>
      <title>bf7c27b9-ed59-4f50-84c7-9e267318c241</title>
      <link>https://db.gcve.eu/sighting/bf7c27b9-ed59-4f50-84c7-9e267318c241/export</link>
      <description>{"uuid": "bf7c27b9-ed59-4f50-84c7-9e267318c241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2392", "type": "seen", "source": "https://t.me/cibsecurity/26347", "content": "\u203c CVE-2021-2392 \u203c\n\nVulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.7.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:48:39.000000Z"}</description>
      <content:encoded>{"uuid": "bf7c27b9-ed59-4f50-84c7-9e267318c241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2392", "type": "seen", "source": "https://t.me/cibsecurity/26347", "content": "\u203c CVE-2021-2392 \u203c\n\nVulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.7.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:48:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf7c27b9-ed59-4f50-84c7-9e267318c241/export</guid>
      <pubDate>Wed, 21 Jul 2021 18:48:39 +0000</pubDate>
    </item>
    <item>
      <title>96f0390e-44cb-49f8-9cc7-68c356a60b34</title>
      <link>https://db.gcve.eu/sighting/96f0390e-44cb-49f8-9cc7-68c356a60b34/export</link>
      <description>{"uuid": "96f0390e-44cb-49f8-9cc7-68c356a60b34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:14.000000Z"}</description>
      <content:encoded>{"uuid": "96f0390e-44cb-49f8-9cc7-68c356a60b34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/96f0390e-44cb-49f8-9cc7-68c356a60b34/export</guid>
      <pubDate>Sun, 31 Aug 2025 03:01:14 +0000</pubDate>
    </item>
    <item>
      <title>e46c1bae-6118-44c8-b344-538d8337b1d8</title>
      <link>https://db.gcve.eu/sighting/e46c1bae-6118-44c8-b344-538d8337b1d8/export</link>
      <description>{"uuid": "e46c1bae-6118-44c8-b344-538d8337b1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</description>
      <content:encoded>{"uuid": "e46c1bae-6118-44c8-b344-538d8337b1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e46c1bae-6118-44c8-b344-538d8337b1d8/export</guid>
      <pubDate>Sun, 31 Aug 2025 03:12:51 +0000</pubDate>
    </item>
    <item>
      <title>45291177-0409-428f-85bd-f65b1d600639</title>
      <link>https://db.gcve.eu/sighting/45291177-0409-428f-85bd-f65b1d600639/export</link>
      <description>{"uuid": "45291177-0409-428f-85bd-f65b1d600639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</description>
      <content:encoded>{"uuid": "45291177-0409-428f-85bd-f65b1d600639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23926", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/45291177-0409-428f-85bd-f65b1d600639/export</guid>
      <pubDate>Wed, 21 Jan 2026 21:18:16 +0000</pubDate>
    </item>
  </channel>
</rss>
