<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:25:28 +0000</lastBuildDate>
    <item>
      <title>5fd244d0-2844-4453-b49b-ff34f0ae819e</title>
      <link>https://db.gcve.eu/sighting/5fd244d0-2844-4453-b49b-ff34f0ae819e/export</link>
      <description>{"uuid": "5fd244d0-2844-4453-b49b-ff34f0ae819e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33337", "type": "seen", "source": "https://t.me/cibsecurity/26801", "content": "\u203c CVE-2021-33337 \u203c\n\nCross-site scripting (XSS) vulnerability in the Document Library module's add document menu in Liferay Portal 7.3.0 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T19:24:12.000000Z"}</description>
      <content:encoded>{"uuid": "5fd244d0-2844-4453-b49b-ff34f0ae819e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-33337", "type": "seen", "source": "https://t.me/cibsecurity/26801", "content": "\u203c CVE-2021-33337 \u203c\n\nCross-site scripting (XSS) vulnerability in the Document Library module's add document menu in Liferay Portal 7.3.0 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T19:24:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5fd244d0-2844-4453-b49b-ff34f0ae819e/export</guid>
      <pubDate>Wed, 04 Aug 2021 19:24:12 +0000</pubDate>
    </item>
  </channel>
</rss>
