<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T16:54:52.935195+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/28e659b1-78a7-4fd6-b32f-e2901afceed4/export</id>
    <title>28e659b1-78a7-4fd6-b32f-e2901afceed4</title>
    <updated>2026-05-14T16:54:53.313570+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "28e659b1-78a7-4fd6-b32f-e2901afceed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-47878", "type": "seen", "source": "https://t.me/cibsecurity/63174", "content": "\u203c CVE-2022-47878 \u203c\n\nIncorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-03T00:30:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/28e659b1-78a7-4fd6-b32f-e2901afceed4/export"/>
    <published>2023-05-03T00:30:24+00:00</published>
  </entry>
</feed>
