<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T17:25:41.808341+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a3b98c00-2753-45ef-bc04-a3e04523bd64/export</id>
    <title>a3b98c00-2753-45ef-bc04-a3e04523bd64</title>
    <updated>2026-05-03T17:25:42.263860+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a3b98c00-2753-45ef-bc04-a3e04523bd64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45921", "type": "seen", "source": "https://t.me/cibsecurity/53607", "content": "\u203c CVE-2022-45921 \u203c\n\nFusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-29T00:28:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a3b98c00-2753-45ef-bc04-a3e04523bd64/export"/>
    <published>2022-11-29T00:28:23+00:00</published>
  </entry>
</feed>
