<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 23:28:38 +0000</lastBuildDate>
    <item>
      <title>acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9</title>
      <link>https://db.gcve.eu/sighting/acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9/export</link>
      <description>{"uuid": "acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21651", "type": "seen", "source": "https://t.me/cibsecurity/35009", "content": "\u203c CVE-2022-21651 \u203c\n\nShopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-05T22:40:25.000000Z"}</description>
      <content:encoded>{"uuid": "acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21651", "type": "seen", "source": "https://t.me/cibsecurity/35009", "content": "\u203c CVE-2022-21651 \u203c\n\nShopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-05T22:40:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/acf9e4d5-d1cb-4a24-ad44-11dcf6e48aa9/export</guid>
      <pubDate>Wed, 05 Jan 2022 22:40:25 +0000</pubDate>
    </item>
  </channel>
</rss>
