<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T04:36:16.965094+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2a3ffe1f-667f-4d53-84d0-8bdf4a85902b/export</id>
    <title>2a3ffe1f-667f-4d53-84d0-8bdf4a85902b</title>
    <updated>2026-05-04T04:36:17.109547+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2a3ffe1f-667f-4d53-84d0-8bdf4a85902b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2a3ffe1f-667f-4d53-84d0-8bdf4a85902b/export"/>
    <published>2025-03-25T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3a9f92ac-db76-4d60-bf36-a8d68ec592e5/export</id>
    <title>3a9f92ac-db76-4d60-bf36-a8d68ec592e5</title>
    <updated>2026-05-04T04:36:17.109403+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3a9f92ac-db76-4d60-bf36-a8d68ec592e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23143", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13157", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-23143\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this vulnerability to maliciously delete and modify files.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T20:12:00.961Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1026164", "creation_timestamp": "2025-04-23T21:05:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3a9f92ac-db76-4d60-bf36-a8d68ec592e5/export"/>
    <published>2025-04-23T21:05:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/38bb5cfe-ceb9-4112-98c2-c8e4baaffb89/export</id>
    <title>38bb5cfe-ceb9-4112-98c2-c8e4baaffb89</title>
    <updated>2026-05-04T04:36:17.109274+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "38bb5cfe-ceb9-4112-98c2-c8e4baaffb89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/38bb5cfe-ceb9-4112-98c2-c8e4baaffb89/export"/>
    <published>2025-05-10T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9662e6fd-54c5-4ae6-83b6-8ff2e81c9475/export</id>
    <title>9662e6fd-54c5-4ae6-83b6-8ff2e81c9475</title>
    <updated>2026-05-04T04:36:17.109144+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9662e6fd-54c5-4ae6-83b6-8ff2e81c9475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-11)", "content": "", "creation_timestamp": "2025-05-11T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9662e6fd-54c5-4ae6-83b6-8ff2e81c9475/export"/>
    <published>2025-05-11T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4bae0626-0482-4bd1-9a32-222b52bd454e/export</id>
    <title>4bae0626-0482-4bd1-9a32-222b52bd454e</title>
    <updated>2026-05-04T04:36:17.109012+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4bae0626-0482-4bd1-9a32-222b52bd454e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-17)", "content": "", "creation_timestamp": "2025-05-17T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4bae0626-0482-4bd1-9a32-222b52bd454e/export"/>
    <published>2025-05-17T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b1b21545-43b8-40ed-ae99-86799df3eb58/export</id>
    <title>b1b21545-43b8-40ed-ae99-86799df3eb58</title>
    <updated>2026-05-04T04:36:17.108875+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b1b21545-43b8-40ed-ae99-86799df3eb58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-18)", "content": "", "creation_timestamp": "2025-09-18T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b1b21545-43b8-40ed-ae99-86799df3eb58/export"/>
    <published>2025-09-18T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7ee6282a-44b8-4423-9ab9-4a27877fbbae/export</id>
    <title>7ee6282a-44b8-4423-9ab9-4a27877fbbae</title>
    <updated>2026-05-04T04:36:17.108737+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7ee6282a-44b8-4423-9ab9-4a27877fbbae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-08)", "content": "", "creation_timestamp": "2025-11-08T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7ee6282a-44b8-4423-9ab9-4a27877fbbae/export"/>
    <published>2025-11-08T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/689ea957-4d2e-4ff4-bce9-9b72f74064f4/export</id>
    <title>689ea957-4d2e-4ff4-bce9-9b72f74064f4</title>
    <updated>2026-05-04T04:36:17.108588+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "689ea957-4d2e-4ff4-bce9-9b72f74064f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/689ea957-4d2e-4ff4-bce9-9b72f74064f4/export"/>
    <published>2025-11-27T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a98b6ff7-c707-45ef-8bd6-073f0b8f45d0/export</id>
    <title>a98b6ff7-c707-45ef-8bd6-073f0b8f45d0</title>
    <updated>2026-05-04T04:36:17.108383+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a98b6ff7-c707-45ef-8bd6-073f0b8f45d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-15)", "content": "", "creation_timestamp": "2026-03-15T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a98b6ff7-c707-45ef-8bd6-073f0b8f45d0/export"/>
    <published>2026-03-15T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9edd3791-1d72-4f56-9dfe-4c57c3f5a1e2/export</id>
    <title>9edd3791-1d72-4f56-9dfe-4c57c3f5a1e2</title>
    <updated>2026-05-04T04:36:17.106654+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9edd3791-1d72-4f56-9dfe-4c57c3f5a1e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2314", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-31)", "content": "", "creation_timestamp": "2026-03-31T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9edd3791-1d72-4f56-9dfe-4c57c3f5a1e2/export"/>
    <published>2026-03-31T00:00:00+00:00</published>
  </entry>
</feed>
