<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 08:28:59 +0000</lastBuildDate>
    <item>
      <title>00ad0af4-666f-4384-ab57-f1114d4bcd65</title>
      <link>https://db.gcve.eu/sighting/00ad0af4-666f-4384-ab57-f1114d4bcd65/export</link>
      <description>{"uuid": "00ad0af4-666f-4384-ab57-f1114d4bcd65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/574", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875.\nURL\uff1ahttps://github.com/SakuraSamuraii/derailed", "creation_timestamp": "2021-09-22T08:04:51.000000Z"}</description>
      <content:encoded>{"uuid": "00ad0af4-666f-4384-ab57-f1114d4bcd65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/574", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875.\nURL\uff1ahttps://github.com/SakuraSamuraii/derailed", "creation_timestamp": "2021-09-22T08:04:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/00ad0af4-666f-4384-ab57-f1114d4bcd65/export</guid>
      <pubDate>Wed, 22 Sep 2021 08:04:51 +0000</pubDate>
    </item>
    <item>
      <title>c4eaecd4-425a-4168-90be-f8ec835dfcba</title>
      <link>https://db.gcve.eu/sighting/c4eaecd4-425a-4168-90be-f8ec835dfcba/export</link>
      <description>{"uuid": "c4eaecd4-425a-4168-90be-f8ec835dfcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "seen", "source": "https://t.me/cibsecurity/29229", "content": "\u203c CVE-2021-40875 \u203c\n\nImproper Access Control in Gurock TestRail versions &amp;lt; 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-22T18:28:54.000000Z"}</description>
      <content:encoded>{"uuid": "c4eaecd4-425a-4168-90be-f8ec835dfcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "seen", "source": "https://t.me/cibsecurity/29229", "content": "\u203c CVE-2021-40875 \u203c\n\nImproper Access Control in Gurock TestRail versions &amp;lt; 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-22T18:28:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c4eaecd4-425a-4168-90be-f8ec835dfcba/export</guid>
      <pubDate>Wed, 22 Sep 2021 18:28:54 +0000</pubDate>
    </item>
    <item>
      <title>cf8b9cb5-8635-4c00-b032-45820bf8faea</title>
      <link>https://db.gcve.eu/sighting/cf8b9cb5-8635-4c00-b032-45820bf8faea/export</link>
      <description>{"uuid": "cf8b9cb5-8635-4c00-b032-45820bf8faea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "published-proof-of-concept", "source": "Telegram/H77sQ3nTMIDJSzVlvQKkaTwPiL5AKhwoHeH1EjMP96cRXA", "content": "", "creation_timestamp": "2021-09-23T20:58:26.000000Z"}</description>
      <content:encoded>{"uuid": "cf8b9cb5-8635-4c00-b032-45820bf8faea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "published-proof-of-concept", "source": "Telegram/H77sQ3nTMIDJSzVlvQKkaTwPiL5AKhwoHeH1EjMP96cRXA", "content": "", "creation_timestamp": "2021-09-23T20:58:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cf8b9cb5-8635-4c00-b032-45820bf8faea/export</guid>
      <pubDate>Thu, 23 Sep 2021 20:58:26 +0000</pubDate>
    </item>
    <item>
      <title>2178b97e-ae04-4666-9003-80a01441df48</title>
      <link>https://db.gcve.eu/sighting/2178b97e-ae04-4666-9003-80a01441df48/export</link>
      <description>{"uuid": "2178b97e-ae04-4666-9003-80a01441df48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwud77yc7k2y", "content": "", "creation_timestamp": "2025-08-20T21:02:33.864106Z"}</description>
      <content:encoded>{"uuid": "2178b97e-ae04-4666-9003-80a01441df48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwud77yc7k2y", "content": "", "creation_timestamp": "2025-08-20T21:02:33.864106Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2178b97e-ae04-4666-9003-80a01441df48/export</guid>
      <pubDate>Wed, 20 Aug 2025 21:02:33 +0000</pubDate>
    </item>
    <item>
      <title>e3a7dfd1-73f8-468c-a62b-e53fe7042a50</title>
      <link>https://db.gcve.eu/sighting/e3a7dfd1-73f8-468c-a62b-e53fe7042a50/export</link>
      <description>{"uuid": "e3a7dfd1-73f8-468c-a62b-e53fe7042a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-16)", "content": "", "creation_timestamp": "2025-09-16T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "e3a7dfd1-73f8-468c-a62b-e53fe7042a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-16)", "content": "", "creation_timestamp": "2025-09-16T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e3a7dfd1-73f8-468c-a62b-e53fe7042a50/export</guid>
      <pubDate>Tue, 16 Sep 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>010e7b77-20bc-45f5-8f82-06f7ffce3d76</title>
      <link>https://db.gcve.eu/sighting/010e7b77-20bc-45f5-8f82-06f7ffce3d76/export</link>
      <description>{"uuid": "010e7b77-20bc-45f5-8f82-06f7ffce3d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "010e7b77-20bc-45f5-8f82-06f7ffce3d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/010e7b77-20bc-45f5-8f82-06f7ffce3d76/export</guid>
      <pubDate>Mon, 22 Sep 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>b88d9b86-561d-4b42-8cfa-ce3218756341</title>
      <link>https://db.gcve.eu/sighting/b88d9b86-561d-4b42-8cfa-ce3218756341/export</link>
      <description>{"uuid": "b88d9b86-561d-4b42-8cfa-ce3218756341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "b88d9b86-561d-4b42-8cfa-ce3218756341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b88d9b86-561d-4b42-8cfa-ce3218756341/export</guid>
      <pubDate>Tue, 30 Dec 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>a2562d2b-2f69-42fe-840a-80c3aaa2cf2c</title>
      <link>https://db.gcve.eu/sighting/a2562d2b-2f69-42fe-840a-80c3aaa2cf2c/export</link>
      <description>{"uuid": "a2562d2b-2f69-42fe-840a-80c3aaa2cf2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "a2562d2b-2f69-42fe-840a-80c3aaa2cf2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40875", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a2562d2b-2f69-42fe-840a-80c3aaa2cf2c/export</guid>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
