<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 21:13:25 +0000</lastBuildDate>
    <item>
      <title>6aa11d93-03d3-4ff6-b477-0a674a143496</title>
      <link>https://db.gcve.eu/sighting/6aa11d93-03d3-4ff6-b477-0a674a143496/export</link>
      <description>{"uuid": "6aa11d93-03d3-4ff6-b477-0a674a143496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27416", "type": "seen", "source": "https://t.me/cibsecurity/40684", "content": "\u203c CVE-2022-27416 \u203c\n\nTcpreplay v4.4.1 was discovered to contain a double-free via __interceptor_free.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T00:17:05.000000Z"}</description>
      <content:encoded>{"uuid": "6aa11d93-03d3-4ff6-b477-0a674a143496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27416", "type": "seen", "source": "https://t.me/cibsecurity/40684", "content": "\u203c CVE-2022-27416 \u203c\n\nTcpreplay v4.4.1 was discovered to contain a double-free via __interceptor_free.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T00:17:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6aa11d93-03d3-4ff6-b477-0a674a143496/export</guid>
      <pubDate>Wed, 13 Apr 2022 00:17:05 +0000</pubDate>
    </item>
    <item>
      <title>329c70a3-f437-4aba-b23c-84d3751b42af</title>
      <link>https://db.gcve.eu/sighting/329c70a3-f437-4aba-b23c-84d3751b42af/export</link>
      <description>{"uuid": "329c70a3-f437-4aba-b23c-84d3751b42af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27418", "type": "seen", "source": "https://t.me/cibsecurity/40686", "content": "\u203c CVE-2022-27418 \u203c\n\nTcpreplay v4.4.1 has a heap-based buffer overflow in do_checksum_math at /tcpedit/checksum.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T00:17:07.000000Z"}</description>
      <content:encoded>{"uuid": "329c70a3-f437-4aba-b23c-84d3751b42af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27418", "type": "seen", "source": "https://t.me/cibsecurity/40686", "content": "\u203c CVE-2022-27418 \u203c\n\nTcpreplay v4.4.1 has a heap-based buffer overflow in do_checksum_math at /tcpedit/checksum.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T00:17:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/329c70a3-f437-4aba-b23c-84d3751b42af/export</guid>
      <pubDate>Wed, 13 Apr 2022 00:17:07 +0000</pubDate>
    </item>
    <item>
      <title>57ee4b2d-edb0-4f73-97f3-d35612a7b4d2</title>
      <link>https://db.gcve.eu/sighting/57ee4b2d-edb0-4f73-97f3-d35612a7b4d2/export</link>
      <description>{"uuid": "57ee4b2d-edb0-4f73-97f3-d35612a7b4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27413", "type": "seen", "source": "https://t.me/cibsecurity/41877", "content": "\u203c CVE-2022-27413 \u203c\n\nHospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the adminname parameter in admin.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T00:39:12.000000Z"}</description>
      <content:encoded>{"uuid": "57ee4b2d-edb0-4f73-97f3-d35612a7b4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27413", "type": "seen", "source": "https://t.me/cibsecurity/41877", "content": "\u203c CVE-2022-27413 \u203c\n\nHospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the adminname parameter in admin.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T00:39:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57ee4b2d-edb0-4f73-97f3-d35612a7b4d2/export</guid>
      <pubDate>Wed, 04 May 2022 00:39:12 +0000</pubDate>
    </item>
    <item>
      <title>885fec34-6bd0-49eb-b107-82e0539a997e</title>
      <link>https://db.gcve.eu/sighting/885fec34-6bd0-49eb-b107-82e0539a997e/export</link>
      <description>{"uuid": "885fec34-6bd0-49eb-b107-82e0539a997e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27411", "type": "seen", "source": "https://t.me/cibsecurity/42047", "content": "\u203c CVE-2022-27411 \u203c\n\nTOTOLINK N600R v5.3c.5507_B20171031 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter in the \"Main\" function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T22:36:45.000000Z"}</description>
      <content:encoded>{"uuid": "885fec34-6bd0-49eb-b107-82e0539a997e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27411", "type": "seen", "source": "https://t.me/cibsecurity/42047", "content": "\u203c CVE-2022-27411 \u203c\n\nTOTOLINK N600R v5.3c.5507_B20171031 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter in the \"Main\" function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T22:36:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/885fec34-6bd0-49eb-b107-82e0539a997e/export</guid>
      <pubDate>Thu, 05 May 2022 22:36:45 +0000</pubDate>
    </item>
    <item>
      <title>863fa665-cdb9-4146-8a96-a0d0e6271842</title>
      <link>https://db.gcve.eu/sighting/863fa665-cdb9-4146-8a96-a0d0e6271842/export</link>
      <description>{"uuid": "863fa665-cdb9-4146-8a96-a0d0e6271842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27412", "type": "seen", "source": "https://t.me/cibsecurity/42211", "content": "\u203c CVE-2022-27412 \u203c\n\nExplore CMS v1.0 was discovered to contain a SQL injection vulnerability via a /page.php?id= request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T22:33:15.000000Z"}</description>
      <content:encoded>{"uuid": "863fa665-cdb9-4146-8a96-a0d0e6271842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27412", "type": "seen", "source": "https://t.me/cibsecurity/42211", "content": "\u203c CVE-2022-27412 \u203c\n\nExplore CMS v1.0 was discovered to contain a SQL injection vulnerability via a /page.php?id= request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T22:33:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/863fa665-cdb9-4146-8a96-a0d0e6271842/export</guid>
      <pubDate>Mon, 09 May 2022 22:33:15 +0000</pubDate>
    </item>
    <item>
      <title>4a905caa-d8a4-4904-a19d-c453de5390a3</title>
      <link>https://db.gcve.eu/sighting/4a905caa-d8a4-4904-a19d-c453de5390a3/export</link>
      <description>{"uuid": "4a905caa-d8a4-4904-a19d-c453de5390a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27414", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7022", "content": "#exploit\n1. Kernel privilege escalation vulnerability collection\nhttps://github.com/Ascotbe/Kernelhub\n\n2. CVE-2022-27414:\nExploit of College Website v1.0 CMS - SQL injection\nhttps://github.com/lus33rr/CVE-2022-27414", "creation_timestamp": "2022-10-21T12:47:53.000000Z"}</description>
      <content:encoded>{"uuid": "4a905caa-d8a4-4904-a19d-c453de5390a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27414", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7022", "content": "#exploit\n1. Kernel privilege escalation vulnerability collection\nhttps://github.com/Ascotbe/Kernelhub\n\n2. CVE-2022-27414:\nExploit of College Website v1.0 CMS - SQL injection\nhttps://github.com/lus33rr/CVE-2022-27414", "creation_timestamp": "2022-10-21T12:47:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4a905caa-d8a4-4904-a19d-c453de5390a3/export</guid>
      <pubDate>Fri, 21 Oct 2022 12:47:53 +0000</pubDate>
    </item>
    <item>
      <title>58b18062-8aaf-49fc-988f-26660b6e5b37</title>
      <link>https://db.gcve.eu/sighting/58b18062-8aaf-49fc-988f-26660b6e5b37/export</link>
      <description>{"uuid": "58b18062-8aaf-49fc-988f-26660b6e5b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27414", "type": "published-proof-of-concept", "source": "https://t.me/premiumAIG/408", "content": "\u200b\u200bCVE-2022-27414\n\nExploit of College Website v1.0 CMS - SQL injection\n\nhttps://github.com/lus33rr/CVE-2022-27414\n\n#cve", "creation_timestamp": "2023-01-04T20:54:08.000000Z"}</description>
      <content:encoded>{"uuid": "58b18062-8aaf-49fc-988f-26660b6e5b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27414", "type": "published-proof-of-concept", "source": "https://t.me/premiumAIG/408", "content": "\u200b\u200bCVE-2022-27414\n\nExploit of College Website v1.0 CMS - SQL injection\n\nhttps://github.com/lus33rr/CVE-2022-27414\n\n#cve", "creation_timestamp": "2023-01-04T20:54:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/58b18062-8aaf-49fc-988f-26660b6e5b37/export</guid>
      <pubDate>Wed, 04 Jan 2023 20:54:08 +0000</pubDate>
    </item>
    <item>
      <title>c688498d-5d35-4b79-a118-a3e78a139256</title>
      <link>https://db.gcve.eu/sighting/c688498d-5d35-4b79-a118-a3e78a139256/export</link>
      <description>{"uuid": "c688498d-5d35-4b79-a118-a3e78a139256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2741", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14865", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-2741\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).\n\ud83d\udccf Published: 2022-10-31T17:45:09.741Z\n\ud83d\udccf Modified: 2025-05-05T14:06:07.171Z\n\ud83d\udd17 References:\n1. https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8", "creation_timestamp": "2025-05-05T14:20:35.000000Z"}</description>
      <content:encoded>{"uuid": "c688498d-5d35-4b79-a118-a3e78a139256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2741", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14865", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-2741\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).\n\ud83d\udccf Published: 2022-10-31T17:45:09.741Z\n\ud83d\udccf Modified: 2025-05-05T14:06:07.171Z\n\ud83d\udd17 References:\n1. https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8", "creation_timestamp": "2025-05-05T14:20:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c688498d-5d35-4b79-a118-a3e78a139256/export</guid>
      <pubDate>Mon, 05 May 2025 14:20:35 +0000</pubDate>
    </item>
  </channel>
</rss>
