<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T18:36:42.466005+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d9425b7c-3a18-4643-8348-e542f187a288/export</id>
    <title>d9425b7c-3a18-4643-8348-e542f187a288</title>
    <updated>2026-04-30T18:36:42.961787+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d9425b7c-3a18-4643-8348-e542f187a288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34736", "type": "seen", "source": "https://t.me/cibsecurity/46026", "content": "\u203c CVE-2022-34736 \u203c\n\nThe frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d9425b7c-3a18-4643-8348-e542f187a288/export"/>
    <published>2022-07-12T18:30:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/75523f3c-72bd-4c0f-96ab-dafa794c26fc/export</id>
    <title>75523f3c-72bd-4c0f-96ab-dafa794c26fc</title>
    <updated>2026-04-30T18:36:42.961706+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "75523f3c-72bd-4c0f-96ab-dafa794c26fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34738", "type": "seen", "source": "https://t.me/cibsecurity/46027", "content": "\u203c CVE-2022-34738 \u203c\n\nThe SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/75523f3c-72bd-4c0f-96ab-dafa794c26fc/export"/>
    <published>2022-07-12T18:30:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99/export</id>
    <title>d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99</title>
    <updated>2026-04-30T18:36:42.961626+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34734", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99/export"/>
    <published>2022-09-13T22:25:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/279be613-2914-4fb0-9528-eb8025c9c236/export</id>
    <title>279be613-2914-4fb0-9528-eb8025c9c236</title>
    <updated>2026-04-30T18:36:42.961538+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "279be613-2914-4fb0-9528-eb8025c9c236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34730", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/279be613-2914-4fb0-9528-eb8025c9c236/export"/>
    <published>2022-09-13T22:25:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7768bbb3-742b-402e-8abc-cc93e849ff11/export</id>
    <title>7768bbb3-742b-402e-8abc-cc93e849ff11</title>
    <updated>2026-04-30T18:36:42.961414+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7768bbb3-742b-402e-8abc-cc93e849ff11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34732", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7768bbb3-742b-402e-8abc-cc93e849ff11/export"/>
    <published>2022-09-13T22:25:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/12168a84-173b-4548-9100-bf85ab7d55c1/export</id>
    <title>12168a84-173b-4548-9100-bf85ab7d55c1</title>
    <updated>2026-04-30T18:36:42.960048+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "12168a84-173b-4548-9100-bf85ab7d55c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3473", "type": "seen", "source": "https://t.me/cibsecurity/51300", "content": "\u203c CVE-2022-3473 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Human Resource Management System. This affects an unknown part of the file getstatecity.php. The manipulation of the argument ci leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-210717 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/12168a84-173b-4548-9100-bf85ab7d55c1/export"/>
    <published>2022-10-13T07:27:19+00:00</published>
  </entry>
</feed>
