<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T19:11:37.379447+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/29913432-829f-4a57-971c-7a4a9c5bdfee/export</id>
    <title>29913432-829f-4a57-971c-7a4a9c5bdfee</title>
    <updated>2026-05-11T19:11:37.759906+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "29913432-829f-4a57-971c-7a4a9c5bdfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45562", "type": "seen", "source": "https://t.me/cibsecurity/53789", "content": "\u203c CVE-2022-45562 \u203c\n\nInsecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T07:47:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/29913432-829f-4a57-971c-7a4a9c5bdfee/export"/>
    <published>2022-12-02T07:47:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2a572507-428a-4252-b591-056317df39d2/export</id>
    <title>2a572507-428a-4252-b591-056317df39d2</title>
    <updated>2026-05-11T19:11:37.758361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2a572507-428a-4252-b591-056317df39d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45562", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13230", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45562\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.\n\ud83d\udccf Published: 2022-12-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:54:06.489Z\n\ud83d\udd17 References:\n1. https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562", "creation_timestamp": "2025-04-24T14:05:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2a572507-428a-4252-b591-056317df39d2/export"/>
    <published>2025-04-24T14:05:49+00:00</published>
  </entry>
</feed>
