<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T06:02:11.123426+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a26b87aa-8bf3-4736-ade8-6b9951f02da4/export</id>
    <title>a26b87aa-8bf3-4736-ade8-6b9951f02da4</title>
    <updated>2026-05-04T06:02:11.492148+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a26b87aa-8bf3-4736-ade8-6b9951f02da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35490", "type": "seen", "source": "https://t.me/cibsecurity/47732", "content": "\u203c CVE-2022-35490 \u203c\n\nZammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:23:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a26b87aa-8bf3-4736-ade8-6b9951f02da4/export"/>
    <published>2022-08-08T18:23:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/edd50f79-6792-4c31-8058-c3d8667803cf/export</id>
    <title>edd50f79-6792-4c31-8058-c3d8667803cf</title>
    <updated>2026-05-04T06:02:11.492010+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "edd50f79-6792-4c31-8058-c3d8667803cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35493", "type": "seen", "source": "https://t.me/cibsecurity/47746", "content": "\u203c CVE-2022-35493 \u203c\n\nA Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:24:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/edd50f79-6792-4c31-8058-c3d8667803cf/export"/>
    <published>2022-08-08T18:24:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/112a46cc-a8d8-4cb5-9154-c27262b71a87/export</id>
    <title>112a46cc-a8d8-4cb5-9154-c27262b71a87</title>
    <updated>2026-05-04T06:02:11.490248+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "112a46cc-a8d8-4cb5-9154-c27262b71a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3549", "type": "seen", "source": "https://t.me/cibsecurity/51573", "content": "\u203c CVE-2022-3549 \u203c\n\nA vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /csms/admin/?page=user/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T16:13:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/112a46cc-a8d8-4cb5-9154-c27262b71a87/export"/>
    <published>2022-10-17T16:13:22+00:00</published>
  </entry>
</feed>
