<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 22:19:24 +0000</lastBuildDate>
    <item>
      <title>e671ca93-c3a2-4064-9709-ee9b996e234e</title>
      <link>https://db.gcve.eu/sighting/e671ca93-c3a2-4064-9709-ee9b996e234e/export</link>
      <description>{"uuid": "e671ca93-c3a2-4064-9709-ee9b996e234e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-25780", "type": "seen", "source": "https://t.me/cibsecurity/23748", "content": "\u203c CVE-2021-25780 \u203c\n\nAn arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-17T18:49:11.000000Z"}</description>
      <content:encoded>{"uuid": "e671ca93-c3a2-4064-9709-ee9b996e234e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-25780", "type": "seen", "source": "https://t.me/cibsecurity/23748", "content": "\u203c CVE-2021-25780 \u203c\n\nAn arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-17T18:49:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e671ca93-c3a2-4064-9709-ee9b996e234e/export</guid>
      <pubDate>Wed, 17 Feb 2021 18:49:11 +0000</pubDate>
    </item>
  </channel>
</rss>
