<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 11:02:32 +0000</lastBuildDate>
    <item>
      <title>e293612f-48e3-4e64-8c88-0994541dbfa2</title>
      <link>https://db.gcve.eu/sighting/e293612f-48e3-4e64-8c88-0994541dbfa2/export</link>
      <description>{"uuid": "e293612f-48e3-4e64-8c88-0994541dbfa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3118", "type": "seen", "source": "https://t.me/cibsecurity/21899", "content": "\u203c CVE-2021-3118 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-11T12:45:21.000000Z"}</description>
      <content:encoded>{"uuid": "e293612f-48e3-4e64-8c88-0994541dbfa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3118", "type": "seen", "source": "https://t.me/cibsecurity/21899", "content": "\u203c CVE-2021-3118 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-11T12:45:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e293612f-48e3-4e64-8c88-0994541dbfa2/export</guid>
      <pubDate>Mon, 11 Jan 2021 12:45:21 +0000</pubDate>
    </item>
    <item>
      <title>5a678c76-6284-416b-ab92-f159557cb717</title>
      <link>https://db.gcve.eu/sighting/5a678c76-6284-416b-ab92-f159557cb717/export</link>
      <description>{"uuid": "5a678c76-6284-416b-ab92-f159557cb717", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/45", "content": "CVE-2021-31181: MicroSoft SharePoint webpart interpretation conflict RCE vulnerability \n\nTo quote @thezdi: \"this vulnerability could be used by an authenticated user to execute arbitrary code on the server in the context of the service account of the SharePoint web application. For a successful attack, the attacker must have SPBasePermissions.ManageLists permissions on any SharePoint site. By default, any authenticated user can create their own site where they have the necessary permission.\"\n\nContents:\n \u2022 The Vulnerability\n \u2022 Proof of Concept\n \u2022 Getting Remote Code Execution\n \u2022 Conclusion\n\nhttps://www.zerodayinitiative.com/blog/2021/6/1/cve-2021-31181-microsoft-sharepoint-webpart-interpretation-conflict-remote-code-execution-vulnerability", "creation_timestamp": "2021-06-03T07:14:15.000000Z"}</description>
      <content:encoded>{"uuid": "5a678c76-6284-416b-ab92-f159557cb717", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/45", "content": "CVE-2021-31181: MicroSoft SharePoint webpart interpretation conflict RCE vulnerability \n\nTo quote @thezdi: \"this vulnerability could be used by an authenticated user to execute arbitrary code on the server in the context of the service account of the SharePoint web application. For a successful attack, the attacker must have SPBasePermissions.ManageLists permissions on any SharePoint site. By default, any authenticated user can create their own site where they have the necessary permission.\"\n\nContents:\n \u2022 The Vulnerability\n \u2022 Proof of Concept\n \u2022 Getting Remote Code Execution\n \u2022 Conclusion\n\nhttps://www.zerodayinitiative.com/blog/2021/6/1/cve-2021-31181-microsoft-sharepoint-webpart-interpretation-conflict-remote-code-execution-vulnerability", "creation_timestamp": "2021-06-03T07:14:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5a678c76-6284-416b-ab92-f159557cb717/export</guid>
      <pubDate>Thu, 03 Jun 2021 07:14:15 +0000</pubDate>
    </item>
    <item>
      <title>109fe375-6d55-402f-9fda-b9ae0ef12926</title>
      <link>https://db.gcve.eu/sighting/109fe375-6d55-402f-9fda-b9ae0ef12926/export</link>
      <description>{"uuid": "109fe375-6d55-402f-9fda-b9ae0ef12926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3531", "content": "#exploit\nCVE-2021-31181:\nMicrosoft SharePoint Webpart Interpretation Conflict RCE\nhttps://www.zerodayinitiative.com/blog/2021/6/1/cve-2021-31181-microsoft-sharepoint-webpart-interpretation-conflict-remote-code-execution-vulnerability", "creation_timestamp": "2021-06-03T15:03:25.000000Z"}</description>
      <content:encoded>{"uuid": "109fe375-6d55-402f-9fda-b9ae0ef12926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3531", "content": "#exploit\nCVE-2021-31181:\nMicrosoft SharePoint Webpart Interpretation Conflict RCE\nhttps://www.zerodayinitiative.com/blog/2021/6/1/cve-2021-31181-microsoft-sharepoint-webpart-interpretation-conflict-remote-code-execution-vulnerability", "creation_timestamp": "2021-06-03T15:03:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/109fe375-6d55-402f-9fda-b9ae0ef12926/export</guid>
      <pubDate>Thu, 03 Jun 2021 15:03:25 +0000</pubDate>
    </item>
    <item>
      <title>3659e06b-57d2-4ee1-a8ab-bc97ddd30c12</title>
      <link>https://db.gcve.eu/sighting/3659e06b-57d2-4ee1-a8ab-bc97ddd30c12/export</link>
      <description>{"uuid": "3659e06b-57d2-4ee1-a8ab-bc97ddd30c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_unsafe_control.rb", "content": "", "creation_timestamp": "2021-06-16T15:47:38.000000Z"}</description>
      <content:encoded>{"uuid": "3659e06b-57d2-4ee1-a8ab-bc97ddd30c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_unsafe_control.rb", "content": "", "creation_timestamp": "2021-06-16T15:47:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3659e06b-57d2-4ee1-a8ab-bc97ddd30c12/export</guid>
      <pubDate>Wed, 16 Jun 2021 15:47:38 +0000</pubDate>
    </item>
    <item>
      <title>c148d8f1-8f79-4da0-9d19-5a8c8672f1b9</title>
      <link>https://db.gcve.eu/sighting/c148d8f1-8f79-4da0-9d19-5a8c8672f1b9/export</link>
      <description>{"uuid": "c148d8f1-8f79-4da0-9d19-5a8c8672f1b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/681", "content": "CVE-2021-31181 Microsoft SharePoint Unsafe Control And ViewState \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-31181_Microsoft_SharePoint_Unsafe_Control_And_ViewState_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-06-20T02:02:06.000000Z"}</description>
      <content:encoded>{"uuid": "c148d8f1-8f79-4da0-9d19-5a8c8672f1b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/681", "content": "CVE-2021-31181 Microsoft SharePoint Unsafe Control And ViewState \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-31181_Microsoft_SharePoint_Unsafe_Control_And_ViewState_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-06-20T02:02:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c148d8f1-8f79-4da0-9d19-5a8c8672f1b9/export</guid>
      <pubDate>Sun, 20 Jun 2021 02:02:06 +0000</pubDate>
    </item>
    <item>
      <title>6179f824-a18a-435b-aaf0-af4dc2f1cd10</title>
      <link>https://db.gcve.eu/sighting/6179f824-a18a-435b-aaf0-af4dc2f1cd10/export</link>
      <description>{"uuid": "6179f824-a18a-435b-aaf0-af4dc2f1cd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31184", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4079", "content": "#exploit\n1.  CVE-2021-31184:\nInformation disclosure in Microsoft Windows\nInfrared Data Association (IrDA)\nhttps://github.com/waleedassar/CVE-2021-31184\n2.  CVE-2021-22545:\nA CVE from BinDiff &amp;amp; IDA Pro\nhttps://jhftss.github.io/CVE-2021-22545", "creation_timestamp": "2021-08-16T11:57:28.000000Z"}</description>
      <content:encoded>{"uuid": "6179f824-a18a-435b-aaf0-af4dc2f1cd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31184", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4079", "content": "#exploit\n1.  CVE-2021-31184:\nInformation disclosure in Microsoft Windows\nInfrared Data Association (IrDA)\nhttps://github.com/waleedassar/CVE-2021-31184\n2.  CVE-2021-22545:\nA CVE from BinDiff &amp;amp; IDA Pro\nhttps://jhftss.github.io/CVE-2021-22545", "creation_timestamp": "2021-08-16T11:57:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6179f824-a18a-435b-aaf0-af4dc2f1cd10/export</guid>
      <pubDate>Mon, 16 Aug 2021 11:57:28 +0000</pubDate>
    </item>
    <item>
      <title>588d3ca1-776e-4154-aabf-83cd4b85a7f3</title>
      <link>https://db.gcve.eu/sighting/588d3ca1-776e-4154-aabf-83cd4b85a7f3/export</link>
      <description>{"uuid": "588d3ca1-776e-4154-aabf-83cd4b85a7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}</description>
      <content:encoded>{"uuid": "588d3ca1-776e-4154-aabf-83cd4b85a7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/588d3ca1-776e-4154-aabf-83cd4b85a7f3/export</guid>
      <pubDate>Thu, 06 Feb 2025 03:13:45 +0000</pubDate>
    </item>
    <item>
      <title>e647599c-8893-4c83-9795-ea1fd47f12b5</title>
      <link>https://db.gcve.eu/sighting/e647599c-8893-4c83-9795-ea1fd47f12b5/export</link>
      <description>{"uuid": "e647599c-8893-4c83-9795-ea1fd47f12b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:37.000000Z"}</description>
      <content:encoded>{"uuid": "e647599c-8893-4c83-9795-ea1fd47f12b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e647599c-8893-4c83-9795-ea1fd47f12b5/export</guid>
      <pubDate>Sun, 23 Feb 2025 04:10:37 +0000</pubDate>
    </item>
  </channel>
</rss>
