<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T18:50:43.450204+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e95879c8-84b2-48eb-83c0-03468301f8f4/export</id>
    <title>e95879c8-84b2-48eb-83c0-03468301f8f4</title>
    <updated>2026-05-11T18:50:43.860640+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e95879c8-84b2-48eb-83c0-03468301f8f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-39996", "type": "seen", "source": "https://t.me/cvedetector/4267", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-39996 - Teldats Router RS123, RS123w XSS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2022-39996 \nPublished : Aug. 27, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in Teldats Router RS123, RS123w allows attacker to execute arbitrary code via the cmdcookie parameter to the upgrade/query.php page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-27T20:44:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e95879c8-84b2-48eb-83c0-03468301f8f4/export"/>
    <published>2024-08-27T20:44:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/19a80a55-3a53-48a9-9562-96a76b522857/export</id>
    <title>19a80a55-3a53-48a9-9562-96a76b522857</title>
    <updated>2026-05-11T18:50:43.860482+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "19a80a55-3a53-48a9-9562-96a76b522857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-39997", "type": "seen", "source": "https://t.me/cvedetector/4275", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-39997 - Teldats Router Weak Password Requirement Remote Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2022-39997 \nPublished : Aug. 27, 2024, 7:15 p.m. | 43\u00a0minutes ago \nDescription : A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-27T22:24:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/19a80a55-3a53-48a9-9562-96a76b522857/export"/>
    <published>2024-08-27T22:24:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2237c2ee-5a42-434f-9bbf-efa424b610f3/export</id>
    <title>2237c2ee-5a42-434f-9bbf-efa424b610f3</title>
    <updated>2026-05-11T18:50:43.858758+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2237c2ee-5a42-434f-9bbf-efa424b610f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3999", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12862", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3999\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The DPD Baltic Shipping WordPress plugin before 1.2.57 does not have authorisation and CSRF in an AJAX action, which could allow any authenticated users, such as subscriber to delete arbitrary options from the blog, which could make the blog unavailable.\n\ud83d\udccf Published: 2022-12-12T17:54:49.698Z\n\ud83d\udccf Modified: 2025-04-22T14:49:47.210Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643", "creation_timestamp": "2025-04-22T15:03:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2237c2ee-5a42-434f-9bbf-efa424b610f3/export"/>
    <published>2025-04-22T15:03:38+00:00</published>
  </entry>
</feed>
