<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T05:17:07.308230+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b/export</id>
    <title>a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b</title>
    <updated>2026-05-04T05:17:07.680492+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "seen", "source": "https://t.me/cibsecurity/54035", "content": "\u203c CVE-2022-44039 \u203c\n\nFranklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00c2\u00b6\u00c2\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b/export"/>
    <published>2022-12-06T00:40:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2ca59afb-785a-484e-b00e-01709f5e6cbf/export</id>
    <title>2ca59afb-785a-484e-b00e-01709f5e6cbf</title>
    <updated>2026-05-04T05:17:07.680440+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2ca59afb-785a-484e-b00e-01709f5e6cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44030", "type": "seen", "source": "https://t.me/cibsecurity/54110", "content": "\u203c CVE-2022-44030 \u203c\n\nRedmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T02:41:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2ca59afb-785a-484e-b00e-01709f5e6cbf/export"/>
    <published>2022-12-07T02:41:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8917d31f-1e54-4ffa-b28f-1702bfb2027c/export</id>
    <title>8917d31f-1e54-4ffa-b28f-1702bfb2027c</title>
    <updated>2026-05-04T05:17:07.680388+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8917d31f-1e54-4ffa-b28f-1702bfb2027c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4403", "type": "seen", "source": "https://t.me/cibsecurity/54264", "content": "\u203c CVE-2022-4403 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Canteen Management System. This vulnerability affects unknown code of the file ajax_represent.php. The manipulation of the argument customer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215272.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-11T18:20:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8917d31f-1e54-4ffa-b28f-1702bfb2027c/export"/>
    <published>2022-12-11T18:20:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f87eb5e9-4555-4530-a9b7-1757be5a3dd4/export</id>
    <title>f87eb5e9-4555-4530-a9b7-1757be5a3dd4</title>
    <updated>2026-05-04T05:17:07.680335+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f87eb5e9-4555-4530-a9b7-1757be5a3dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/cibsecurity/54266", "content": "\u203c CVE-2022-44031 \u203c\n\nRedmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T07:20:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f87eb5e9-4555-4530-a9b7-1757be5a3dd4/export"/>
    <published>2022-12-12T07:20:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d/export</id>
    <title>f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d</title>
    <updated>2026-05-04T05:17:07.680278+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44036", "type": "seen", "source": "https://t.me/cibsecurity/55842", "content": "\u203c CVE-2022-44036 \u203c\n\nRESERVED There is an arbitrary file upload vulnerability in b2evolution v7.2.5. Attackers can use this vulnerability to execute remote commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T00:17:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d/export"/>
    <published>2023-01-04T00:17:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/10f7c679-3c7d-4f09-adcc-eb4086b4489b/export</id>
    <title>10f7c679-3c7d-4f09-adcc-eb4086b4489b</title>
    <updated>2026-05-04T05:17:07.680204+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "10f7c679-3c7d-4f09-adcc-eb4086b4489b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44031\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Redmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\ud83d\udccf Published: 2022-12-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:35:00.372Z\n\ud83d\udd17 References:\n1. https://www.redmine.org/projects/redmine/wiki/Security_Advisories", "creation_timestamp": "2025-04-22T21:04:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/10f7c679-3c7d-4f09-adcc-eb4086b4489b/export"/>
    <published>2025-04-22T21:04:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b72550f2-cab7-43bf-9b60-9b125a369b53/export</id>
    <title>b72550f2-cab7-43bf-9b60-9b125a369b53</title>
    <updated>2026-05-04T05:17:07.679515+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b72550f2-cab7-43bf-9b60-9b125a369b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44039\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Franklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00b6\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:55:15.058Z\n\ud83d\udd17 References:\n1. https://pastebin.com/raw/64stbsWu", "creation_timestamp": "2025-04-24T14:05:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b72550f2-cab7-43bf-9b60-9b125a369b53/export"/>
    <published>2025-04-24T14:05:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/620461bd-e981-474e-978a-965d176e0756/export</id>
    <title>620461bd-e981-474e-978a-965d176e0756</title>
    <updated>2026-05-04T05:17:07.679461+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "620461bd-e981-474e-978a-965d176e0756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44033", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/620461bd-e981-474e-978a-965d176e0756/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0a6a6b82-b7eb-41f8-a892-738820cd84bb/export</id>
    <title>0a6a6b82-b7eb-41f8-a892-738820cd84bb</title>
    <updated>2026-05-04T05:17:07.679378+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0a6a6b82-b7eb-41f8-a892-738820cd84bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44034", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0a6a6b82-b7eb-41f8-a892-738820cd84bb/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/45b06ed4-467d-4a09-8739-3624d730b3e4/export</id>
    <title>45b06ed4-467d-4a09-8739-3624d730b3e4</title>
    <updated>2026-05-04T05:17:07.678098+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "45b06ed4-467d-4a09-8739-3624d730b3e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44032", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/45b06ed4-467d-4a09-8739-3624d730b3e4/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
