<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-18T18:07:29.229674+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c3f1786c-259b-426a-bbc1-0855565b48a9/export</id>
    <title>c3f1786c-259b-426a-bbc1-0855565b48a9</title>
    <updated>2026-05-18T18:07:29.536921+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c3f1786c-259b-426a-bbc1-0855565b48a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27569", "type": "seen", "source": "https://t.me/cibsecurity/40511", "content": "\u203c CVE-2022-27569 \u203c\n\nHeap-based buffer overflow vulnerability in parser_infe function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:16:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c3f1786c-259b-426a-bbc1-0855565b48a9/export"/>
    <published>2022-04-12T00:16:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/19129c16-6e8e-44f0-928d-5629244cf71d/export</id>
    <title>19129c16-6e8e-44f0-928d-5629244cf71d</title>
    <updated>2026-05-18T18:07:29.536869+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "19129c16-6e8e-44f0-928d-5629244cf71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27567", "type": "seen", "source": "https://t.me/cibsecurity/40540", "content": "\u203c CVE-2022-27567 \u203c\n\nNull pointer dereference vulnerability in parser_hvcC function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attackers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:22:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/19129c16-6e8e-44f0-928d-5629244cf71d/export"/>
    <published>2022-04-12T00:22:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/38f8a36b-e199-48aa-80fd-bd749a7bd914/export</id>
    <title>38f8a36b-e199-48aa-80fd-bd749a7bd914</title>
    <updated>2026-05-18T18:07:29.536817+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "38f8a36b-e199-48aa-80fd-bd749a7bd914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27568", "type": "seen", "source": "https://t.me/cibsecurity/40559", "content": "\u203c CVE-2022-27568 \u203c\n\nHeap-based buffer overflow vulnerability in parser_iloc function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:30:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/38f8a36b-e199-48aa-80fd-bd749a7bd914/export"/>
    <published>2022-04-12T00:30:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de/export</id>
    <title>1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de</title>
    <updated>2026-05-18T18:07:29.536763+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2756", "type": "seen", "source": "https://t.me/cibsecurity/47874", "content": "\u203c CVE-2022-2756 \u203c\n\nServer-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T20:26:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de/export"/>
    <published>2022-08-10T20:26:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e94b8685-5ea0-418f-b116-8c0370621df1/export</id>
    <title>e94b8685-5ea0-418f-b116-8c0370621df1</title>
    <updated>2026-05-18T18:07:29.536703+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e94b8685-5ea0-418f-b116-8c0370621df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27560", "type": "seen", "source": "https://t.me/cibsecurity/49085", "content": "\u203c CVE-2022-27560 \u203c\n\nHCL VersionVault Express exposes administrator credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e94b8685-5ea0-418f-b116-8c0370621df1/export"/>
    <published>2022-08-31T02:36:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2d082a8a-0d6e-4d99-b748-64169c738925/export</id>
    <title>2d082a8a-0d6e-4d99-b748-64169c738925</title>
    <updated>2026-05-18T18:07:29.536640+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2d082a8a-0d6e-4d99-b748-64169c738925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27563", "type": "seen", "source": "https://t.me/cibsecurity/49087", "content": "\u203c CVE-2022-27563 \u203c\n\nAn unauthenticated user can overload a part of HCL VersionVault Express and cause a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2d082a8a-0d6e-4d99-b748-64169c738925/export"/>
    <published>2022-08-31T02:36:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93642331-93e6-45d7-a0e6-ae4650e8ed12/export</id>
    <title>93642331-93e6-45d7-a0e6-ae4650e8ed12</title>
    <updated>2026-05-18T18:07:29.536578+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "93642331-93e6-45d7-a0e6-ae4650e8ed12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27561", "type": "seen", "source": "https://t.me/cibsecurity/49856", "content": "\u203c CVE-2022-27561 \u203c\n\nThere is a reflected Cross-Site Scripting vulnerability in the HCL Traveler web admin (LotusTraveler.nsf).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T02:27:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/93642331-93e6-45d7-a0e6-ae4650e8ed12/export"/>
    <published>2022-09-16T02:27:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5/export</id>
    <title>ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5</title>
    <updated>2026-05-18T18:07:29.536508+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-27562\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications.\n\ud83d\udccf Published: 2025-04-30T20:54:20.782Z\n\ud83d\udccf Modified: 2025-04-30T20:54:20.782Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;amp;sysparm_article=KB0120722", "creation_timestamp": "2025-04-30T21:15:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5/export"/>
    <published>2025-04-30T21:15:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c/export</id>
    <title>6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c</title>
    <updated>2026-05-18T18:07:29.536426+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2rxhwxgh2l", "content": "", "creation_timestamp": "2025-04-30T21:55:49.800910Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c/export"/>
    <published>2025-04-30T21:55:49.800910+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7cfa4d12-8734-49da-b9e7-3bc2d3b5d447/export</id>
    <title>7cfa4d12-8734-49da-b9e7-3bc2d3b5d447</title>
    <updated>2026-05-18T18:07:29.534593+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7cfa4d12-8734-49da-b9e7-3bc2d3b5d447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/cvedetector/24154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27562 - HCL Domino Volt HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27562 \nPublished : April 30, 2025, 9:15 p.m. | 48\u00a0minutes ago \nDescription : Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7cfa4d12-8734-49da-b9e7-3bc2d3b5d447/export"/>
    <published>2025-05-01T00:36:51+00:00</published>
  </entry>
</feed>
