<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:09:50 +0000</lastBuildDate>
    <item>
      <title>eefc6178-bf67-4350-993e-a0d6bb71bf56</title>
      <link>https://db.gcve.eu/sighting/eefc6178-bf67-4350-993e-a0d6bb71bf56/export</link>
      <description>{"uuid": "eefc6178-bf67-4350-993e-a0d6bb71bf56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-36717", "type": "seen", "source": "https://t.me/cibsecurity/28340", "content": "\u203c CVE-2021-36717 \u203c\n\nIn order to perform a directory traversal attack, all an attacker needs is a web browser and some knowledge on where to blindly find any default files and directories on the system. on the \"Name\" parameter the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-07T16:17:25.000000Z"}</description>
      <content:encoded>{"uuid": "eefc6178-bf67-4350-993e-a0d6bb71bf56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-36717", "type": "seen", "source": "https://t.me/cibsecurity/28340", "content": "\u203c CVE-2021-36717 \u203c\n\nIn order to perform a directory traversal attack, all an attacker needs is a web browser and some knowledge on where to blindly find any default files and directories on the system. on the \"Name\" parameter the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-07T16:17:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eefc6178-bf67-4350-993e-a0d6bb71bf56/export</guid>
      <pubDate>Tue, 07 Sep 2021 16:17:25 +0000</pubDate>
    </item>
  </channel>
</rss>
