<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T07:51:45.545260+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2a9cb16a-6dd5-4789-8d79-6452d00ced5d/export</id>
    <title>2a9cb16a-6dd5-4789-8d79-6452d00ced5d</title>
    <updated>2026-05-02T07:51:45.930250+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2a9cb16a-6dd5-4789-8d79-6452d00ced5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-1751", "type": "seen", "source": "https://t.me/cvedetector/3387", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-1751 - BluePoint VMubility Server-Side Request Forgery\", \n  \"Content\": \"CVE ID : CVE-2022-1751 \nPublished : Aug. 17, 2024, 8:15 a.m. | 21\u00a0minutes ago \nDescription : The Skitter Slideshow plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.2 via the /image.php file. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-17T10:37:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2a9cb16a-6dd5-4789-8d79-6452d00ced5d/export"/>
    <published>2024-08-17T10:37:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ca9107c2-0e2a-40bf-a845-f7552656cab7/export</id>
    <title>ca9107c2-0e2a-40bf-a845-f7552656cab7</title>
    <updated>2026-05-02T07:51:45.929300+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ca9107c2-0e2a-40bf-a845-f7552656cab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-1751", "type": "seen", "source": "https://t.me/CveExploits/11", "content": "\ud83d\udea8 CVE-2022-1751\nThe Skitter Slideshow plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.2 via the /image.php file. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.", "creation_timestamp": "2024-08-17T14:00:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ca9107c2-0e2a-40bf-a845-f7552656cab7/export"/>
    <published>2024-08-17T14:00:29+00:00</published>
  </entry>
</feed>
