<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 12 May 2026 18:27:04 +0000</lastBuildDate>
    <item>
      <title>2d59d04e-da47-47b9-a485-bef9446d8516</title>
      <link>https://db.gcve.eu/sighting/2d59d04e-da47-47b9-a485-bef9446d8516/export</link>
      <description>{"uuid": "2d59d04e-da47-47b9-a485-bef9446d8516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31185", "type": "seen", "source": "https://t.me/cibsecurity/47382", "content": "\u203c CVE-2022-31185 \u203c\n\nmprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Users on the official instance will already have this issue fixed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-02T00:17:26.000000Z"}</description>
      <content:encoded>{"uuid": "2d59d04e-da47-47b9-a485-bef9446d8516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31185", "type": "seen", "source": "https://t.me/cibsecurity/47382", "content": "\u203c CVE-2022-31185 \u203c\n\nmprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Users on the official instance will already have this issue fixed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-02T00:17:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2d59d04e-da47-47b9-a485-bef9446d8516/export</guid>
      <pubDate>Tue, 02 Aug 2022 00:17:26 +0000</pubDate>
    </item>
    <item>
      <title>259bc2a0-c462-47e1-bd34-b633c1eefa58</title>
      <link>https://db.gcve.eu/sighting/259bc2a0-c462-47e1-bd34-b633c1eefa58/export</link>
      <description>{"uuid": "259bc2a0-c462-47e1-bd34-b633c1eefa58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31185", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13109", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31185\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: mprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Users on the official instance will already have this issue fixed.\n\ud83d\udccf Published: 2022-08-01T19:25:11.000Z\n\ud83d\udccf Modified: 2025-04-23T17:56:22.307Z\n\ud83d\udd17 References:\n1. https://github.com/makedeb/mprweb/security/advisories/GHSA-jm39-h693-678g\n2. https://github.com/makedeb/mprweb/commit/d13e3f2f5a9c0b0f6782f35d837090732026ad77", "creation_timestamp": "2025-04-23T18:05:50.000000Z"}</description>
      <content:encoded>{"uuid": "259bc2a0-c462-47e1-bd34-b633c1eefa58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31185", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13109", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31185\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: mprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Users on the official instance will already have this issue fixed.\n\ud83d\udccf Published: 2022-08-01T19:25:11.000Z\n\ud83d\udccf Modified: 2025-04-23T17:56:22.307Z\n\ud83d\udd17 References:\n1. https://github.com/makedeb/mprweb/security/advisories/GHSA-jm39-h693-678g\n2. https://github.com/makedeb/mprweb/commit/d13e3f2f5a9c0b0f6782f35d837090732026ad77", "creation_timestamp": "2025-04-23T18:05:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/259bc2a0-c462-47e1-bd34-b633c1eefa58/export</guid>
      <pubDate>Wed, 23 Apr 2025 18:05:50 +0000</pubDate>
    </item>
  </channel>
</rss>
