<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T20:35:30.072598+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ce55b7c7-692b-461f-8e68-f64ddf4f9c4e/export</id>
    <title>ce55b7c7-692b-461f-8e68-f64ddf4f9c4e</title>
    <updated>2026-05-04T20:35:30.572146+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ce55b7c7-692b-461f-8e68-f64ddf4f9c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21785", "type": "seen", "source": "https://t.me/cibsecurity/45654", "content": "\u203c CVE-2022-21785 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06807363; Issue ID: ALPS06807363.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ce55b7c7-692b-461f-8e68-f64ddf4f9c4e/export"/>
    <published>2022-07-06T18:14:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d8ddf26d-13d5-4634-99ca-9ab442fc8fac/export</id>
    <title>d8ddf26d-13d5-4634-99ca-9ab442fc8fac</title>
    <updated>2026-05-04T20:35:30.572095+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d8ddf26d-13d5-4634-99ca-9ab442fc8fac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21780", "type": "seen", "source": "https://t.me/cibsecurity/45658", "content": "\u203c CVE-2022-21780 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704526.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d8ddf26d-13d5-4634-99ca-9ab442fc8fac/export"/>
    <published>2022-07-06T18:14:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/765605bd-0362-40a4-bef2-55b6c582e4f9/export</id>
    <title>765605bd-0362-40a4-bef2-55b6c582e4f9</title>
    <updated>2026-05-04T20:35:30.572042+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "765605bd-0362-40a4-bef2-55b6c582e4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21782", "type": "seen", "source": "https://t.me/cibsecurity/45664", "content": "\u203c CVE-2022-21782 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704508.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/765605bd-0362-40a4-bef2-55b6c582e4f9/export"/>
    <published>2022-07-06T18:14:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/43c03732-6e07-46f1-9313-15501d3bad8f/export</id>
    <title>43c03732-6e07-46f1-9313-15501d3bad8f</title>
    <updated>2026-05-04T20:35:30.571985+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "43c03732-6e07-46f1-9313-15501d3bad8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21783", "type": "seen", "source": "https://t.me/cibsecurity/45667", "content": "\u203c CVE-2022-21783 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704482.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/43c03732-6e07-46f1-9313-15501d3bad8f/export"/>
    <published>2022-07-06T18:14:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c64f7222-606c-464b-812e-ce6a29c399fb/export</id>
    <title>c64f7222-606c-464b-812e-ce6a29c399fb</title>
    <updated>2026-05-04T20:35:30.571926+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c64f7222-606c-464b-812e-ce6a29c399fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21781", "type": "seen", "source": "https://t.me/cibsecurity/45670", "content": "\u203c CVE-2022-21781 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704433.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c64f7222-606c-464b-812e-ce6a29c399fb/export"/>
    <published>2022-07-06T18:14:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/62110bc6-c9c9-4bab-a15e-7fb96b5499d8/export</id>
    <title>62110bc6-c9c9-4bab-a15e-7fb96b5499d8</title>
    <updated>2026-05-04T20:35:30.571852+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "62110bc6-c9c9-4bab-a15e-7fb96b5499d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21789", "type": "seen", "source": "https://t.me/cibsecurity/47332", "content": "\u203c CVE-2022-21789 \u203c\n\nIn audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:16:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/62110bc6-c9c9-4bab-a15e-7fb96b5499d8/export"/>
    <published>2022-08-01T18:16:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/322d8fd5-d903-4c5a-b8f7-47d6ee8268fd/export</id>
    <title>322d8fd5-d903-4c5a-b8f7-47d6ee8268fd</title>
    <updated>2026-05-04T20:35:30.570574+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "322d8fd5-d903-4c5a-b8f7-47d6ee8268fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21788", "type": "seen", "source": "https://t.me/cibsecurity/47346", "content": "\u203c CVE-2022-21788 \u203c\n\nIn scp, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06988728; Issue ID: ALPS06988728.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:17:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/322d8fd5-d903-4c5a-b8f7-47d6ee8268fd/export"/>
    <published>2022-08-01T18:17:12+00:00</published>
  </entry>
</feed>
