<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T20:39:20.544709+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d0a65197-106e-4273-8baa-23d65bd19c63/export</id>
    <title>d0a65197-106e-4273-8baa-23d65bd19c63</title>
    <updated>2026-05-11T20:39:20.859236+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d0a65197-106e-4273-8baa-23d65bd19c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32498", "type": "seen", "source": "https://t.me/cibsecurity/46737", "content": "\u203c CVE-2022-32498 \u203c\n\nDell EMC PowerStore, Versions prior to v3.0.0.0 contain a DLL Hijacking vulnerability in PSTCLI. A local attacker can potentially exploit this vulnerability to execute arbitrary code, escalate privileges, and bypass software allow list solutions, leading to system takeover or IP exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-21T07:13:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d0a65197-106e-4273-8baa-23d65bd19c63/export"/>
    <published>2022-07-21T07:13:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/33784973-4555-440b-be1d-44d014fb5950/export</id>
    <title>33784973-4555-440b-be1d-44d014fb5950</title>
    <updated>2026-05-11T20:39:20.859145+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "33784973-4555-440b-be1d-44d014fb5950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32492", "type": "seen", "source": "https://t.me/cibsecurity/51133", "content": "\u203c CVE-2022-32492 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T20:26:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/33784973-4555-440b-be1d-44d014fb5950/export"/>
    <published>2022-10-11T20:26:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2a56f3b0-7f87-44f3-95f1-725173222ec7/export</id>
    <title>2a56f3b0-7f87-44f3-95f1-725173222ec7</title>
    <updated>2026-05-11T20:39:20.859056+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2a56f3b0-7f87-44f3-95f1-725173222ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3249", "type": "seen", "source": "https://t.me/cibsecurity/54000", "content": "\u203c CVE-2022-3249 \u203c\n\nThe WP CSV Exporter WordPress plugin before 1.3.7 does not properly sanitise and escape some parameters before using them in a SQL statement, allowing high privilege users such as admin to perform SQL injection attacks\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T20:40:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2a56f3b0-7f87-44f3-95f1-725173222ec7/export"/>
    <published>2022-12-05T20:40:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0/export</id>
    <title>7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0</title>
    <updated>2026-05-11T20:39:20.857774+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32490", "type": "seen", "source": "https://t.me/cibsecurity/56656", "content": "\u203c CVE-2022-32490 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-18T12:20:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0/export"/>
    <published>2023-01-18T12:20:48+00:00</published>
  </entry>
</feed>
