<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:59:54 +0000</lastBuildDate>
    <item>
      <title>c98fa902-9cd1-41bd-bf1e-550995e3fcd4</title>
      <link>https://db.gcve.eu/sighting/c98fa902-9cd1-41bd-bf1e-550995e3fcd4/export</link>
      <description>{"uuid": "c98fa902-9cd1-41bd-bf1e-550995e3fcd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-39213", "type": "seen", "source": "https://t.me/cibsecurity/28919", "content": "\u203c CVE-2021-39213 \u203c\n\nGLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-15T20:22:05.000000Z"}</description>
      <content:encoded>{"uuid": "c98fa902-9cd1-41bd-bf1e-550995e3fcd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-39213", "type": "seen", "source": "https://t.me/cibsecurity/28919", "content": "\u203c CVE-2021-39213 \u203c\n\nGLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-15T20:22:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c98fa902-9cd1-41bd-bf1e-550995e3fcd4/export</guid>
      <pubDate>Wed, 15 Sep 2021 20:22:05 +0000</pubDate>
    </item>
  </channel>
</rss>
