<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 21:47:40 +0000</lastBuildDate>
    <item>
      <title>847d3d77-e833-4c90-b11b-062922010d02</title>
      <link>https://db.gcve.eu/sighting/847d3d77-e833-4c90-b11b-062922010d02/export</link>
      <description>{"uuid": "847d3d77-e833-4c90-b11b-062922010d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24892", "type": "seen", "source": "https://t.me/cibsecurity/41583", "content": "\u203c CVE-2022-24892 \u203c\n\nShopware is an open source e-commerce software platform. Starting with version 5.0.4 and before version 5.7.9, multiple tokens for password reset can be requested. All tokens can be used to change the password. This makes it possible for an attacker to take over the victim's account if they somehow gain access to the victims email account and find an unused password reset token in the emails. This issue is fixed in version 5.7.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-28T18:24:29.000000Z"}</description>
      <content:encoded>{"uuid": "847d3d77-e833-4c90-b11b-062922010d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24892", "type": "seen", "source": "https://t.me/cibsecurity/41583", "content": "\u203c CVE-2022-24892 \u203c\n\nShopware is an open source e-commerce software platform. Starting with version 5.0.4 and before version 5.7.9, multiple tokens for password reset can be requested. All tokens can be used to change the password. This makes it possible for an attacker to take over the victim's account if they somehow gain access to the victims email account and find an unused password reset token in the emails. This issue is fixed in version 5.7.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-28T18:24:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/847d3d77-e833-4c90-b11b-062922010d02/export</guid>
      <pubDate>Thu, 28 Apr 2022 18:24:29 +0000</pubDate>
    </item>
  </channel>
</rss>
