<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T11:03:59.770405+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/72160e73-4895-47ec-a8a6-bce2183d020d/export</id>
    <title>72160e73-4895-47ec-a8a6-bce2183d020d</title>
    <updated>2026-05-03T11:04:00.124176+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "72160e73-4895-47ec-a8a6-bce2183d020d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45911", "type": "seen", "source": "https://t.me/cibsecurity/56086", "content": "\u203c CVE-2022-45911 \u203c\n\nAn issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-07T02:25:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/72160e73-4895-47ec-a8a6-bce2183d020d/export"/>
    <published>2023-01-07T02:25:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/55189eab-f95f-44d3-ab94-2c2c22b91f73/export</id>
    <title>55189eab-f95f-44d3-ab94-2c2c22b91f73</title>
    <updated>2026-05-03T11:04:00.121913+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "55189eab-f95f-44d3-ab94-2c2c22b91f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45911", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45911\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information.\n\ud83d\udccf Published: 2023-01-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-09T20:31:37.345Z\n\ud83d\udd17 References:\n1. https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories\n2. https://wiki.zimbra.com/wiki/Security_Center", "creation_timestamp": "2025-04-09T20:48:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/55189eab-f95f-44d3-ab94-2c2c22b91f73/export"/>
    <published>2025-04-09T20:48:49+00:00</published>
  </entry>
</feed>
