<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T09:02:41.214218+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3cda41b2-7c0a-464d-99af-905d829e33a4/export</id>
    <title>3cda41b2-7c0a-464d-99af-905d829e33a4</title>
    <updated>2026-05-03T09:02:41.597123+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3cda41b2-7c0a-464d-99af-905d829e33a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38550", "type": "seen", "source": "https://t.me/cibsecurity/50101", "content": "\u203c CVE-2022-38550 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T02:38:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3cda41b2-7c0a-464d-99af-905d829e33a4/export"/>
    <published>2022-09-20T02:38:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4d979db4-f518-4269-950c-a9c59b62880f/export</id>
    <title>4d979db4-f518-4269-950c-a9c59b62880f</title>
    <updated>2026-05-03T09:02:41.597068+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d979db4-f518-4269-950c-a9c59b62880f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "seen", "source": "https://t.me/cibsecurity/50463", "content": "\u203c CVE-2022-38553 \u203c\n\nAcademy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T14:22:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d979db4-f518-4269-950c-a9c59b62880f/export"/>
    <published>2022-09-26T14:22:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/40a0e84d-f01d-4701-90e1-89e85f78aef7/export</id>
    <title>40a0e84d-f01d-4701-90e1-89e85f78aef7</title>
    <updated>2026-05-03T09:02:41.597000+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "40a0e84d-f01d-4701-90e1-89e85f78aef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/310", "content": "Now here are the cve of linksys and Tp-Link equipment\n\nFor those who do not know linksys is a manufacturer of networking equipment for small offices and homes. They make network hubs, routers, and network cards. \n\nFor example, linksys' managed switches include features for rapid network expansion. The STP and Storm Control protocol features help control planned or unintended cable loops linksys help protect the network with port authentication which requires clients to authenticate themselves before they start working, clients must authenticate themselves before transmitting any data. \nSo what are the vulnerabilities of this equipment ?\n\nHere are some cve \nFor example, there is CVE-2022-38555 it is a buffer overflow vulnerability in Linksys E1200 already has a poc  or CVE-2020-35713 remote pre-authentication code execution in Linksys RE6500 already has an exploit for it too . \nMore details about the attacks in the archive below \ud83e\ude78\n\nNow about TP-LINK - it is also a supplier of Wi-Fi routers for home and office and one of the largest manufacturers of network equipment. \n\nI will also tell you about some cve of their equipment \nFor example CVE-2022-30075  - importing a malicious backup file via web interface can lead to remote code execution due to wrong checks , there is an exploit for it or CVE-2022-24355 this is RCE vulnerability, i.e. it allows intruders in neighboring network to run arbitrary code on router installations . No authentication is required to exploit this vulnerability. The problem arises because there is no proper length check on user data before it is copied to a fixed-length stack buffer. An attacker can use this vulnerability to execute code in a root context. \nRead more about it link\n\nAnd I think that's it .\nIn this post we have analyzed types of attacks and some hardware vulnerabilities. \nRead more in the archive below\ud83c\udf1f .There will be more articles about the attacks in the future.\n\nThank you for reading\u2764\ufe0f\nRemember Alice, there is a rabbit hole in the looking glass, so follow the rabbit \ud83d\udc07\ud83c\udf80\n#network #wifi #attacks #cve #exploit #dos #traffic_analysis #router", "creation_timestamp": "2022-11-09T07:53:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/40a0e84d-f01d-4701-90e1-89e85f78aef7/export"/>
    <published>2022-11-09T07:53:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a8f2a026-4517-473d-85e1-bba88a5f9605/export</id>
    <title>a8f2a026-4517-473d-85e1-bba88a5f9605</title>
    <updated>2026-05-03T09:02:41.596912+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a8f2a026-4517-473d-85e1-bba88a5f9605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/308", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u0432\u0435\u0434\u0443 cve \u0443 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f linksys \u0438 Tp-Link\n\n\u0414\u043b\u044f \u0442\u0435\u0445 \u043a\u0442\u043e \u043d\u0435 \u0437\u043d\u0430\u0435\u0442 linksys \u044d\u0442\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043c\u0430\u043b\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0438 \u0434\u043e\u043c\u0430. \u041e\u043d\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u043e\u043d\u0446\u0435\u043d\u0442\u0440\u0430\u0442\u043e\u0440\u044b, \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b, \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u0430\u0440\u0442\u044b. \n\n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u044b \u043e\u0442 linksys \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u0431\u044b\u0441\u0442\u0440\u043e\u0433\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f  \u0441\u0435\u0442\u0438. \u0424\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 STP \u0438 Storm Control \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043a\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0435\u0442\u043b\u0438 linksys \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u0442\u043e\u0432, \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0435\u0439 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c, \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u0434\u043e\u043b\u0436\u043d\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u043f\u0435\u0440\u0435\u0434 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u043b\u044e\u0431\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \n\u0422\u0430\u043a \u043a\u0430\u043a\u0438\u0435 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443 \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f ?\n\n\u041f\u0440\u0438\u0432\u0435\u0434\u0443 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e cve \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0435\u0441\u0442\u044c CVE-2022-38555 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 Linksys E1200 \u043d\u0430 \u043d\u0435\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c poc \u0438\u043b\u0438 CVE-2020-35713 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Linksys RE6500  \u043d\u0430 \u043d\u0435\u0435 \u0442\u043e\u0436\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  . \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435 \ud83e\ude78\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e TP-LINK-  \u044d\u0442\u043e \u0442\u043e\u0436\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a Wi-Fi\u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0434\u043b\u044f \u0434\u043e\u043c\u0430 \u0438 \u043e\u0444\u0438\u0441\u0430 \u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f  . \n\n\u0422\u043e\u0436\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043f\u0440\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 cve \u0438\u0445 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443  CVE-2022-30075 -  \u0438\u043c\u043f\u043e\u0440\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0439 \u043a\u043e\u043f\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 , \u043d\u0430 \u043d\u0435\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  \u0438\u043b\u0438   CVE-2022-24355 \u044d\u0442\u043e RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442.\u0435 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0435\u0439 \u0441\u0435\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 . \u0414\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0434\u043b\u0438\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 \u0438\u0445 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0442\u0435\u043a\u043e\u0432\u044b\u0439 \u0431\u0443\u0444\u0435\u0440 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0434\u043b\u0438\u043d\u044b. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 root. \n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043e \u043d\u0435\u0439  \u0442\u044b\u043a\n\n\u0410 \u043d\u0430 \u044d\u0442\u043e\u043c \u0434\u0443\u043c\u0430\u044e \u0432\u0441\u0435 .\n\u0412 \u044d\u0442\u043e\u043c \u043f\u043e\u0441\u0442\u0435 \u043c\u044b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0438 \u0432\u0438\u0434\u044b \u0430\u0442\u0430\u043a \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435\ud83c\udf1f .\u0412 \u0431\u0443\u0434\u0443\u0449\u0435\u043c \u0431\u0443\u0434\u0443\u0442  \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u044b \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438\n\n\u0421\u043f\u0430\u0441\u0438\u0431\u043e \u0437\u0430 \u043f\u0440\u043e\u0447\u0442\u0435\u043d\u0438\u0435\u2764\ufe0f\n\u0418 \u043f\u043e\u043c\u043d\u0438 \u0410\u043b\u0438\u0441\u0430 , \u043a\u0440\u043e\u043b\u0438\u0447\u044c\u044f \u043d\u043e\u0440\u0430 \u0435\u0441\u0442\u044c \u0438 \u0432 \u0437\u0430\u0437\u0435\u0440\u043a\u0430\u043b\u044c\u0435 \u043f\u043e \u044d\u0442\u043e\u043c\u0443 \u0441\u043b\u0435\u0434\u0443\u0439 \u0437\u0430 \u043a\u0440\u043e\u043b\u0438\u043a\u043e\u043c \u0438 \u0434\u0430\u043b\u044c\u0448\u0435\ud83d\udc07\ud83c\udf80\n#network  #wifi  #attacks #cve #exploit  #dos  #traffic_analysis #router", "creation_timestamp": "2022-11-15T12:28:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a8f2a026-4517-473d-85e1-bba88a5f9605/export"/>
    <published>2022-11-15T12:28:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6a07e298-f105-4c5e-93b5-4ee02cd48be5/export</id>
    <title>6a07e298-f105-4c5e-93b5-4ee02cd48be5</title>
    <updated>2026-05-03T09:02:41.596852+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6a07e298-f105-4c5e-93b5-4ee02cd48be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/cibsecurity/56195", "content": "\u203c CVE-2022-3855 \u203c\n\nThe 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-10T02:28:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6a07e298-f105-4c5e-93b5-4ee02cd48be5/export"/>
    <published>2023-01-10T02:28:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/82783f30-90a9-40eb-b68d-9c6d3fa4e894/export</id>
    <title>82783f30-90a9-40eb-b68d-9c6d3fa4e894</title>
    <updated>2026-05-03T09:02:41.596756+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "82783f30-90a9-40eb-b68d-9c6d3fa4e894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11129", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3855\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2023-01-09T22:13:43.274Z\n\ud83d\udccf Modified: 2025-04-09T18:38:24.520Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb", "creation_timestamp": "2025-04-09T18:48:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/82783f30-90a9-40eb-b68d-9c6d3fa4e894/export"/>
    <published>2025-04-09T18:48:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d227a724-6e04-41a6-8d68-9495fad7fed4/export</id>
    <title>d227a724-6e04-41a6-8d68-9495fad7fed4</title>
    <updated>2026-05-03T09:02:41.595613+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d227a724-6e04-41a6-8d68-9495fad7fed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-38553\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\ud83d\udccf Published: 2022-09-26T09:59:06.000Z\n\ud83d\udccf Modified: 2025-05-21T16:14:51.489Z\n\ud83d\udd17 References:\n1. http://academy.com\n2. https://codecanyon.net/item/academy-course-based-learning-management-system/22703468\n3. https://demo.creativeitem.com/academy/home/\n4. https://demo.creativeitem.com/academy/home/search?query=%22%3E%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E\n5. https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md", "creation_timestamp": "2025-05-21T16:41:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d227a724-6e04-41a6-8d68-9495fad7fed4/export"/>
    <published>2025-05-21T16:41:59+00:00</published>
  </entry>
</feed>
