<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T21:39:45.168762+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3c74ee0a-2c86-4715-adb9-dea6e70668d1/export</id>
    <title>3c74ee0a-2c86-4715-adb9-dea6e70668d1</title>
    <updated>2026-05-01T21:39:45.528865+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3c74ee0a-2c86-4715-adb9-dea6e70668d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25611", "type": "seen", "source": "https://t.me/cibsecurity/39567", "content": "\u203c CVE-2022-25611 \u203c\n\nAuthenticated Stored Cross-Site Scripting (XSS) in Simple Event Planner plugin &amp;lt;= 1.5.4 allows attackers with contributor or higher user roles to inject the malicious script by using vulnerable parameter &amp;amp;custom[add_seg][].\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-25T21:31:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c74ee0a-2c86-4715-adb9-dea6e70668d1/export"/>
    <published>2022-03-25T21:31:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b80b8b2b-decd-4fb7-aa02-1621f7479db1/export</id>
    <title>b80b8b2b-decd-4fb7-aa02-1621f7479db1</title>
    <updated>2026-05-01T21:39:45.528802+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b80b8b2b-decd-4fb7-aa02-1621f7479db1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25610", "type": "seen", "source": "https://t.me/cibsecurity/39570", "content": "\u203c CVE-2022-25610 \u203c\n\nUnauthenticated Stored Cross-Site Scripting (XSS) in Simple Ajax Chat &amp;lt;= 20220115 allows an attacker to store the malicious code. However, the attack requires specific conditions, making it hard to exploit.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-25T21:31:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b80b8b2b-decd-4fb7-aa02-1621f7479db1/export"/>
    <published>2022-03-25T21:31:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ab0669de-16c9-459e-8b82-7e95ae7ba265/export</id>
    <title>ab0669de-16c9-459e-8b82-7e95ae7ba265</title>
    <updated>2026-05-01T21:39:45.528740+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ab0669de-16c9-459e-8b82-7e95ae7ba265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25619", "type": "seen", "source": "https://t.me/cibsecurity/39816", "content": "\u203c CVE-2022-25619 \u203c\n\nImproper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in ping tool of Profelis IT Consultancy SambaBox allows AUTHENTICATED user to cause run arbitrary code. This issue affects: Profelis IT Consultancy SambaBox 4.0 version 4.0 and prior versions on x86.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T18:37:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ab0669de-16c9-459e-8b82-7e95ae7ba265/export"/>
    <published>2022-03-30T18:37:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/766dbf63-fe75-4674-ab6a-162f5e087849/export</id>
    <title>766dbf63-fe75-4674-ab6a-162f5e087849</title>
    <updated>2026-05-01T21:39:45.528639+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "766dbf63-fe75-4674-ab6a-162f5e087849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25615", "type": "seen", "source": "https://t.me/cibsecurity/40526", "content": "\u203c CVE-2022-25615 \u203c\n\nCross-Site Request Forgery (CSRF) in StylemixThemes eRoom \u00e2\u20ac\u201c Zoom Meetings &amp;amp; Webinar (WordPress plugin) &amp;lt;= 1.3.8 allows cache deletion.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:22:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/766dbf63-fe75-4674-ab6a-162f5e087849/export"/>
    <published>2022-04-12T00:22:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5d5a64ac-a748-4195-80e1-4146b52f0e5a/export</id>
    <title>5d5a64ac-a748-4195-80e1-4146b52f0e5a</title>
    <updated>2026-05-01T21:39:45.528427+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5d5a64ac-a748-4195-80e1-4146b52f0e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25617", "type": "seen", "source": "https://t.me/cibsecurity/42949", "content": "\u203c CVE-2022-25617 \u203c\n\nReflected Cross-Site Scripting (XSS) vulnerability in Code Snippets plugin &amp;lt;= 2.14.3 at WordPress via &amp;amp;orderby vulnerable parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-18T22:28:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5d5a64ac-a748-4195-80e1-4146b52f0e5a/export"/>
    <published>2022-05-18T22:28:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2b4f7625-a1a5-4460-9806-d3c8b1eec959/export</id>
    <title>2b4f7625-a1a5-4460-9806-d3c8b1eec959</title>
    <updated>2026-05-01T21:39:45.528183+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2b4f7625-a1a5-4460-9806-d3c8b1eec959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2561", "type": "seen", "source": "https://t.me/cibsecurity/61043", "content": "\u203c CVE-2022-2561 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of OPC Labs QuickOPC 2022.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XML files in Connectivity Explorer. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16596.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T22:15:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2b4f7625-a1a5-4460-9806-d3c8b1eec959/export"/>
    <published>2023-03-29T22:15:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a3c560f8-d7fc-4fba-b399-5382b469462b/export</id>
    <title>a3c560f8-d7fc-4fba-b399-5382b469462b</title>
    <updated>2026-05-01T21:39:45.527870+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a3c560f8-d7fc-4fba-b399-5382b469462b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25614", "type": "seen", "source": "https://t.me/arpsyndicate/585", "content": "#ExploitObserverAlert\n\nCVE-2022-25614\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-25614. Cross-Site Request Forgery (CSRF) in StylemixThemes eRoom \u2013 Zoom Meetings", "creation_timestamp": "2023-11-26T04:30:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a3c560f8-d7fc-4fba-b399-5382b469462b/export"/>
    <published>2023-11-26T04:30:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/48eab572-06e0-4e9f-915f-ab50332847a4/export</id>
    <title>48eab572-06e0-4e9f-915f-ab50332847a4</title>
    <updated>2026-05-01T21:39:45.525553+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "48eab572-06e0-4e9f-915f-ab50332847a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2561", "type": "seen", "source": "Telegram/r1X9b2Wu6pRYrLepnE3gKtgHzYlQqK947cmpkzIC8pG49aRA", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/48eab572-06e0-4e9f-915f-ab50332847a4/export"/>
    <published>2025-02-18T21:11:32+00:00</published>
  </entry>
</feed>
