<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T07:04:32.436806+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/357222e7-80e2-4bf7-bea2-2d83fe00daab/export</id>
    <title>357222e7-80e2-4bf7-bea2-2d83fe00daab</title>
    <updated>2026-05-02T07:04:32.763323+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "357222e7-80e2-4bf7-bea2-2d83fe00daab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27004", "type": "seen", "source": "https://t.me/cibsecurity/38979", "content": "\u203c CVE-2022-27004 \u203c\n\nTotolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6in4 function via the remote6in4 parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:19:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/357222e7-80e2-4bf7-bea2-2d83fe00daab/export"/>
    <published>2022-03-16T01:19:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c8aa1cbc-c040-432f-ad3e-30430c7434a5/export</id>
    <title>c8aa1cbc-c040-432f-ad3e-30430c7434a5</title>
    <updated>2026-05-02T07:04:32.763248+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c8aa1cbc-c040-432f-ad3e-30430c7434a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27000", "type": "seen", "source": "https://t.me/cibsecurity/38982", "content": "\u203c CVE-2022-27000 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:19:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c8aa1cbc-c040-432f-ad3e-30430c7434a5/export"/>
    <published>2022-03-16T01:19:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1c5e8c45-6f48-4efc-a00d-93a334e6fe44/export</id>
    <title>1c5e8c45-6f48-4efc-a00d-93a334e6fe44</title>
    <updated>2026-05-02T07:04:32.763195+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1c5e8c45-6f48-4efc-a00d-93a334e6fe44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27001", "type": "seen", "source": "https://t.me/cibsecurity/38983", "content": "\u203c CVE-2022-27001 \u203c\n\nArris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the dhcp function via the hostname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:19:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1c5e8c45-6f48-4efc-a00d-93a334e6fe44/export"/>
    <published>2022-03-16T01:19:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/44e540da-6615-4ad8-b9f8-4a12d4edcd91/export</id>
    <title>44e540da-6615-4ad8-b9f8-4a12d4edcd91</title>
    <updated>2026-05-02T07:04:32.763132+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "44e540da-6615-4ad8-b9f8-4a12d4edcd91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27002", "type": "seen", "source": "https://t.me/cibsecurity/38998", "content": "\u203c CVE-2022-27002 \u203c\n\nArris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the ddns function via the ddns_name, ddns_pwd, h_ddns?ddns_host parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/44e540da-6615-4ad8-b9f8-4a12d4edcd91/export"/>
    <published>2022-03-16T01:20:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/033eea29-367f-4a1b-8b9b-489e3a0541e5/export</id>
    <title>033eea29-367f-4a1b-8b9b-489e3a0541e5</title>
    <updated>2026-05-02T07:04:32.763075+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "033eea29-367f-4a1b-8b9b-489e3a0541e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27007", "type": "seen", "source": "https://t.me/cibsecurity/40775", "content": "\u203c CVE-2022-27007 \u203c\n\nnginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-14T18:19:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/033eea29-367f-4a1b-8b9b-489e3a0541e5/export"/>
    <published>2022-04-14T18:19:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b2b599e7-09ca-4e17-8f48-70c547e7b4bd/export</id>
    <title>b2b599e7-09ca-4e17-8f48-70c547e7b4bd</title>
    <updated>2026-05-02T07:04:32.763017+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b2b599e7-09ca-4e17-8f48-70c547e7b4bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27008", "type": "seen", "source": "https://t.me/cibsecurity/40776", "content": "\u203c CVE-2022-27008 \u203c\n\nnginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-14T18:56:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b2b599e7-09ca-4e17-8f48-70c547e7b4bd/export"/>
    <published>2022-04-14T18:56:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a1ee3d87-16fa-420e-8f3a-dfb8dc98b592/export</id>
    <title>a1ee3d87-16fa-420e-8f3a-dfb8dc98b592</title>
    <updated>2026-05-02T07:04:32.762930+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a1ee3d87-16fa-420e-8f3a-dfb8dc98b592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2700", "type": "seen", "source": "https://t.me/cibsecurity/47724", "content": "\u203c CVE-2022-2700 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Gym Management System. This affects an unknown part of the component GET Parameter Handler. The manipulation of the argument day leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205821 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T16:23:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a1ee3d87-16fa-420e-8f3a-dfb8dc98b592/export"/>
    <published>2022-08-08T16:23:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d2abc961-26ca-4ce0-8eff-f859d7e46d47/export</id>
    <title>d2abc961-26ca-4ce0-8eff-f859d7e46d47</title>
    <updated>2026-05-02T07:04:32.760556+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d2abc961-26ca-4ce0-8eff-f859d7e46d47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27002", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d2abc961-26ca-4ce0-8eff-f859d7e46d47/export"/>
    <published>2025-08-31T03:13:02+00:00</published>
  </entry>
</feed>
