<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:19:53 +0000</lastBuildDate>
    <item>
      <title>5aed88c5-2f34-42a1-b768-5d51bfd91737</title>
      <link>https://db.gcve.eu/sighting/5aed88c5-2f34-42a1-b768-5d51bfd91737/export</link>
      <description>{"uuid": "5aed88c5-2f34-42a1-b768-5d51bfd91737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26991", "type": "seen", "source": "https://t.me/cibsecurity/38986", "content": "\u203c CVE-2022-26991 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ntp function via the TimeZone parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:19:54.000000Z"}</description>
      <content:encoded>{"uuid": "5aed88c5-2f34-42a1-b768-5d51bfd91737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26991", "type": "seen", "source": "https://t.me/cibsecurity/38986", "content": "\u203c CVE-2022-26991 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ntp function via the TimeZone parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:19:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5aed88c5-2f34-42a1-b768-5d51bfd91737/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:19:54 +0000</pubDate>
    </item>
    <item>
      <title>e2e19b47-e912-485f-b2e1-b474bc67ad6d</title>
      <link>https://db.gcve.eu/sighting/e2e19b47-e912-485f-b2e1-b474bc67ad6d/export</link>
      <description>{"uuid": "e2e19b47-e912-485f-b2e1-b474bc67ad6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26993", "type": "seen", "source": "https://t.me/cibsecurity/38991", "content": "\u203c CVE-2022-26993 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pppoe function via the pppoeUserName, pppoePassword, and pppoe_Service parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:02.000000Z"}</description>
      <content:encoded>{"uuid": "e2e19b47-e912-485f-b2e1-b474bc67ad6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26993", "type": "seen", "source": "https://t.me/cibsecurity/38991", "content": "\u203c CVE-2022-26993 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pppoe function via the pppoeUserName, pppoePassword, and pppoe_Service parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e2e19b47-e912-485f-b2e1-b474bc67ad6d/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:20:02 +0000</pubDate>
    </item>
    <item>
      <title>bc48912a-9e57-43f2-947c-2f242b96c6df</title>
      <link>https://db.gcve.eu/sighting/bc48912a-9e57-43f2-947c-2f242b96c6df/export</link>
      <description>{"uuid": "bc48912a-9e57-43f2-947c-2f242b96c6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26994", "type": "seen", "source": "https://t.me/cibsecurity/38992", "content": "\u203c CVE-2022-26994 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pptp function via the pptpUserName and pptpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:03.000000Z"}</description>
      <content:encoded>{"uuid": "bc48912a-9e57-43f2-947c-2f242b96c6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26994", "type": "seen", "source": "https://t.me/cibsecurity/38992", "content": "\u203c CVE-2022-26994 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pptp function via the pptpUserName and pptpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bc48912a-9e57-43f2-947c-2f242b96c6df/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:20:03 +0000</pubDate>
    </item>
    <item>
      <title>60f028a2-6acb-4091-b8bc-00028fbf25dc</title>
      <link>https://db.gcve.eu/sighting/60f028a2-6acb-4091-b8bc-00028fbf25dc/export</link>
      <description>{"uuid": "60f028a2-6acb-4091-b8bc-00028fbf25dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26997", "type": "seen", "source": "https://t.me/cibsecurity/38994", "content": "\u203c CVE-2022-26997 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the upnp function via the upnp_ttl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:06.000000Z"}</description>
      <content:encoded>{"uuid": "60f028a2-6acb-4091-b8bc-00028fbf25dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26997", "type": "seen", "source": "https://t.me/cibsecurity/38994", "content": "\u203c CVE-2022-26997 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the upnp function via the upnp_ttl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/60f028a2-6acb-4091-b8bc-00028fbf25dc/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:20:06 +0000</pubDate>
    </item>
    <item>
      <title>c80bff53-a974-4fdd-b64c-a888c3104ca5</title>
      <link>https://db.gcve.eu/sighting/c80bff53-a974-4fdd-b64c-a888c3104ca5/export</link>
      <description>{"uuid": "c80bff53-a974-4fdd-b64c-a888c3104ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26992", "type": "seen", "source": "https://t.me/cibsecurity/38995", "content": "\u203c CVE-2022-26992 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:07.000000Z"}</description>
      <content:encoded>{"uuid": "c80bff53-a974-4fdd-b64c-a888c3104ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26992", "type": "seen", "source": "https://t.me/cibsecurity/38995", "content": "\u203c CVE-2022-26992 \u203c\n\nArris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c80bff53-a974-4fdd-b64c-a888c3104ca5/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:20:07 +0000</pubDate>
    </item>
    <item>
      <title>9a0ac514-b2e1-4c71-bebc-feba1f41fcf9</title>
      <link>https://db.gcve.eu/sighting/9a0ac514-b2e1-4c71-bebc-feba1f41fcf9/export</link>
      <description>{"uuid": "9a0ac514-b2e1-4c71-bebc-feba1f41fcf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26998", "type": "seen", "source": "https://t.me/cibsecurity/38996", "content": "\u203c CVE-2022-26998 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:08.000000Z"}</description>
      <content:encoded>{"uuid": "9a0ac514-b2e1-4c71-bebc-feba1f41fcf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26998", "type": "seen", "source": "https://t.me/cibsecurity/38996", "content": "\u203c CVE-2022-26998 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T01:20:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9a0ac514-b2e1-4c71-bebc-feba1f41fcf9/export</guid>
      <pubDate>Wed, 16 Mar 2022 01:20:08 +0000</pubDate>
    </item>
    <item>
      <title>a4a1110e-ce71-4009-9e15-d7ba863978dd</title>
      <link>https://db.gcve.eu/sighting/a4a1110e-ce71-4009-9e15-d7ba863978dd/export</link>
      <description>{"uuid": "a4a1110e-ce71-4009-9e15-d7ba863978dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26996", "type": "seen", "source": "https://t.me/cibsecurity/38993", "content": "\u203c CVE-2022-26996 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T04:22:50.000000Z"}</description>
      <content:encoded>{"uuid": "a4a1110e-ce71-4009-9e15-d7ba863978dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26996", "type": "seen", "source": "https://t.me/cibsecurity/38993", "content": "\u203c CVE-2022-26996 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T04:22:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a4a1110e-ce71-4009-9e15-d7ba863978dd/export</guid>
      <pubDate>Wed, 16 Mar 2022 04:22:50 +0000</pubDate>
    </item>
    <item>
      <title>60a8c21b-c149-4ff5-a3fd-51d0cc832079</title>
      <link>https://db.gcve.eu/sighting/60a8c21b-c149-4ff5-a3fd-51d0cc832079/export</link>
      <description>{"uuid": "60a8c21b-c149-4ff5-a3fd-51d0cc832079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26999", "type": "seen", "source": "https://t.me/cibsecurity/38988", "content": "\u203c CVE-2022-26999 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T04:22:57.000000Z"}</description>
      <content:encoded>{"uuid": "60a8c21b-c149-4ff5-a3fd-51d0cc832079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26999", "type": "seen", "source": "https://t.me/cibsecurity/38988", "content": "\u203c CVE-2022-26999 \u203c\n\nArris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T04:22:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/60a8c21b-c149-4ff5-a3fd-51d0cc832079/export</guid>
      <pubDate>Wed, 16 Mar 2022 04:22:57 +0000</pubDate>
    </item>
    <item>
      <title>7ec98d8f-2889-4134-aa8f-ff006267e412</title>
      <link>https://db.gcve.eu/sighting/7ec98d8f-2889-4134-aa8f-ff006267e412/export</link>
      <description>{"uuid": "7ec98d8f-2889-4134-aa8f-ff006267e412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2699", "type": "seen", "source": "https://t.me/cibsecurity/47721", "content": "\u203c CVE-2022-2699 \u203c\n\nA vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T16:23:33.000000Z"}</description>
      <content:encoded>{"uuid": "7ec98d8f-2889-4134-aa8f-ff006267e412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2699", "type": "seen", "source": "https://t.me/cibsecurity/47721", "content": "\u203c CVE-2022-2699 \u203c\n\nA vulnerability was found in SourceCodester Simple E-Learning System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /claire_blake. The manipulation of the argument phoneNumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205820.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T16:23:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7ec98d8f-2889-4134-aa8f-ff006267e412/export</guid>
      <pubDate>Mon, 08 Aug 2022 16:23:33 +0000</pubDate>
    </item>
  </channel>
</rss>
