<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 16:42:00 +0000</lastBuildDate>
    <item>
      <title>957082af-62bc-4308-9fa9-aaa641540a42</title>
      <link>https://db.gcve.eu/sighting/957082af-62bc-4308-9fa9-aaa641540a42/export</link>
      <description>{"uuid": "957082af-62bc-4308-9fa9-aaa641540a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-36371", "type": "seen", "source": "https://t.me/cibsecurity/26047", "content": "\u203c CVE-2021-36371 \u203c\n\nEmissary-Ingress (formerly Ambassador API Gateway) through 1.13.9 allows attackers to bypass client certificate requirements (i.e., mTLS cert_required) on backend upstreams when more than one TLSContext is defined and at least one configuration exists that does not require client certificate authentication. The attacker must send an SNI specifying an unprotected backend and an HTTP Host header specifying a protected backend.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-10T00:15:12.000000Z"}</description>
      <content:encoded>{"uuid": "957082af-62bc-4308-9fa9-aaa641540a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-36371", "type": "seen", "source": "https://t.me/cibsecurity/26047", "content": "\u203c CVE-2021-36371 \u203c\n\nEmissary-Ingress (formerly Ambassador API Gateway) through 1.13.9 allows attackers to bypass client certificate requirements (i.e., mTLS cert_required) on backend upstreams when more than one TLSContext is defined and at least one configuration exists that does not require client certificate authentication. The attacker must send an SNI specifying an unprotected backend and an HTTP Host header specifying a protected backend.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-10T00:15:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/957082af-62bc-4308-9fa9-aaa641540a42/export</guid>
      <pubDate>Sat, 10 Jul 2021 00:15:12 +0000</pubDate>
    </item>
  </channel>
</rss>
