<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T19:19:58.765348+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2e41c6cb-9f19-484d-b6d0-293add35801b/export</id>
    <title>2e41c6cb-9f19-484d-b6d0-293add35801b</title>
    <updated>2026-04-30T19:19:59.122618+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2e41c6cb-9f19-484d-b6d0-293add35801b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27049", "type": "seen", "source": "https://t.me/cibsecurity/39956", "content": "\u203c CVE-2022-27049 \u203c\n\nRaidrive before v2021.12.35 allows attackers to arbitrarily move log files by pre-creating a mountpoint and log files before Raidrive is installed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-01T02:19:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2e41c6cb-9f19-484d-b6d0-293add35801b/export"/>
    <published>2022-04-01T02:19:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f386bc22-12fc-469e-9b34-b66b4edb0a8f/export</id>
    <title>f386bc22-12fc-469e-9b34-b66b4edb0a8f</title>
    <updated>2026-04-30T19:19:59.122565+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f386bc22-12fc-469e-9b34-b66b4edb0a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27044", "type": "seen", "source": "https://t.me/cibsecurity/40385", "content": "\u203c CVE-2022-27044 \u203c\n\nlibsixel 1.8.6 is affected by Buffer Overflow in libsixel/src/quant.c:876.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-08T18:38:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f386bc22-12fc-469e-9b34-b66b4edb0a8f/export"/>
    <published>2022-04-08T18:38:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f3e94bed-e04c-49df-85ea-39d9a6f58a4d/export</id>
    <title>f3e94bed-e04c-49df-85ea-39d9a6f58a4d</title>
    <updated>2026-04-30T19:19:59.122504+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f3e94bed-e04c-49df-85ea-39d9a6f58a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27046", "type": "seen", "source": "https://t.me/cibsecurity/40386", "content": "\u203c CVE-2022-27046 \u203c\n\nlibsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-08T18:38:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f3e94bed-e04c-49df-85ea-39d9a6f58a4d/export"/>
    <published>2022-04-08T18:38:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8d92981e-c969-4034-88f0-0967fca4c658/export</id>
    <title>8d92981e-c969-4034-88f0-0967fca4c658</title>
    <updated>2026-04-30T19:19:59.122445+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8d92981e-c969-4034-88f0-0967fca4c658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27047", "type": "seen", "source": "https://t.me/cibsecurity/40392", "content": "\u203c CVE-2022-27047 \u203c\n\nmogu_blog_cms 5.2 suffers from upload arbitrary files without any limitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-08T20:16:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8d92981e-c969-4034-88f0-0967fca4c658/export"/>
    <published>2022-04-08T20:16:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6886d2d1-a256-4cc2-9ad9-37afbf8078d2/export</id>
    <title>6886d2d1-a256-4cc2-9ad9-37afbf8078d2</title>
    <updated>2026-04-30T19:19:59.122367+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6886d2d1-a256-4cc2-9ad9-37afbf8078d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27041", "type": "seen", "source": "https://t.me/cibsecurity/40480", "content": "\u203c CVE-2022-27041 \u203c\n\nDue to lack of protection, parameter student_id in OpenSIS Classic 8.0 /modules/eligibility/Student.php can be used to inject SQL queries to extract information from databases.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-11T18:16:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6886d2d1-a256-4cc2-9ad9-37afbf8078d2/export"/>
    <published>2022-04-11T18:16:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/06951168-ebef-4701-9857-8225d202a71a/export</id>
    <title>06951168-ebef-4701-9857-8225d202a71a</title>
    <updated>2026-04-30T19:19:59.120629+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "06951168-ebef-4701-9857-8225d202a71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2704", "type": "seen", "source": "https://t.me/cibsecurity/47718", "content": "\u203c CVE-2022-2704 \u203c\n\nA vulnerability was found in SourceCodester Simple E-Learning System. It has been declared as problematic. This vulnerability affects unknown code of the file downloadFiles.php. The manipulation of the argument download leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205828.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T16:23:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/06951168-ebef-4701-9857-8225d202a71a/export"/>
    <published>2022-08-08T16:23:29+00:00</published>
  </entry>
</feed>
