<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T15:40:51.713253+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4db96d78-90dc-4df8-8bc1-040e3f01cdf3/export</id>
    <title>4db96d78-90dc-4df8-8bc1-040e3f01cdf3</title>
    <updated>2026-05-06T15:40:52.305928+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4db96d78-90dc-4df8-8bc1-040e3f01cdf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/cibsecurity/48223", "content": "\u203c CVE-2022-38362 \u203c\n\nApache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T18:39:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4db96d78-90dc-4df8-8bc1-040e3f01cdf3/export"/>
    <published>2022-08-16T18:39:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ae0e4f1b-b9f9-465d-a3d7-14d8e628c886/export</id>
    <title>ae0e4f1b-b9f9-465d-a3d7-14d8e628c886</title>
    <updated>2026-05-06T15:40:52.302856+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ae0e4f1b-b9f9-465d-a3d7-14d8e628c886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/ctinow/68265", "content": "Internet Bug Bounty: CVE-2022-38362: Apache Airflow Docker Provider &amp;lt;3.0 RCE vulnerability in example dag\n\nhttps://ift.tt/IVXMqKA", "creation_timestamp": "2022-10-10T22:26:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ae0e4f1b-b9f9-465d-a3d7-14d8e628c886/export"/>
    <published>2022-10-10T22:26:50+00:00</published>
  </entry>
</feed>
