<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 08:28:40 +0000</lastBuildDate>
    <item>
      <title>fc1012d9-ed36-448d-8183-e4164a6e33fc</title>
      <link>https://db.gcve.eu/sighting/fc1012d9-ed36-448d-8183-e4164a6e33fc/export</link>
      <description>{"uuid": "fc1012d9-ed36-448d-8183-e4164a6e33fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37788", "type": "seen", "source": "https://t.me/cibsecurity/27010", "content": "\u203c CVE-2021-37788 \u203c\n\nA vulnerability in the web UI of Gurock TestRail v5.3.0.3603 could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T16:36:55.000000Z"}</description>
      <content:encoded>{"uuid": "fc1012d9-ed36-448d-8183-e4164a6e33fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37788", "type": "seen", "source": "https://t.me/cibsecurity/27010", "content": "\u203c CVE-2021-37788 \u203c\n\nA vulnerability in the web UI of Gurock TestRail v5.3.0.3603 could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T16:36:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fc1012d9-ed36-448d-8183-e4164a6e33fc/export</guid>
      <pubDate>Mon, 09 Aug 2021 16:36:55 +0000</pubDate>
    </item>
  </channel>
</rss>
