<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 15:27:31 +0000</lastBuildDate>
    <item>
      <title>b5058d43-3ae3-46a8-b5a5-d8f05e875d2b</title>
      <link>https://db.gcve.eu/sighting/b5058d43-3ae3-46a8-b5a5-d8f05e875d2b/export</link>
      <description>{"uuid": "b5058d43-3ae3-46a8-b5a5-d8f05e875d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33332", "type": "seen", "source": "https://t.me/cibsecurity/26780", "content": "\u203c CVE-2021-33332 \u203c\n\nCross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:29:06.000000Z"}</description>
      <content:encoded>{"uuid": "b5058d43-3ae3-46a8-b5a5-d8f05e875d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33332", "type": "seen", "source": "https://t.me/cibsecurity/26780", "content": "\u203c CVE-2021-33332 \u203c\n\nCross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:29:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b5058d43-3ae3-46a8-b5a5-d8f05e875d2b/export</guid>
      <pubDate>Wed, 04 Aug 2021 00:29:06 +0000</pubDate>
    </item>
  </channel>
</rss>
