<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:22:44 +0000</lastBuildDate>
    <item>
      <title>d9425b7c-3a18-4643-8348-e542f187a288</title>
      <link>https://db.gcve.eu/sighting/d9425b7c-3a18-4643-8348-e542f187a288/export</link>
      <description>{"uuid": "d9425b7c-3a18-4643-8348-e542f187a288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34736", "type": "seen", "source": "https://t.me/cibsecurity/46026", "content": "\u203c CVE-2022-34736 \u203c\n\nThe frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:30.000000Z"}</description>
      <content:encoded>{"uuid": "d9425b7c-3a18-4643-8348-e542f187a288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34736", "type": "seen", "source": "https://t.me/cibsecurity/46026", "content": "\u203c CVE-2022-34736 \u203c\n\nThe frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d9425b7c-3a18-4643-8348-e542f187a288/export</guid>
      <pubDate>Tue, 12 Jul 2022 18:30:30 +0000</pubDate>
    </item>
    <item>
      <title>75523f3c-72bd-4c0f-96ab-dafa794c26fc</title>
      <link>https://db.gcve.eu/sighting/75523f3c-72bd-4c0f-96ab-dafa794c26fc/export</link>
      <description>{"uuid": "75523f3c-72bd-4c0f-96ab-dafa794c26fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34738", "type": "seen", "source": "https://t.me/cibsecurity/46027", "content": "\u203c CVE-2022-34738 \u203c\n\nThe SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:31.000000Z"}</description>
      <content:encoded>{"uuid": "75523f3c-72bd-4c0f-96ab-dafa794c26fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34738", "type": "seen", "source": "https://t.me/cibsecurity/46027", "content": "\u203c CVE-2022-34738 \u203c\n\nThe SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/75523f3c-72bd-4c0f-96ab-dafa794c26fc/export</guid>
      <pubDate>Tue, 12 Jul 2022 18:30:31 +0000</pubDate>
    </item>
    <item>
      <title>d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99</title>
      <link>https://db.gcve.eu/sighting/d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99/export</link>
      <description>{"uuid": "d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34734", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</description>
      <content:encoded>{"uuid": "d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34734", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d96eb2e9-eff2-4a28-a31f-80c9cb9bbe99/export</guid>
      <pubDate>Tue, 13 Sep 2022 22:25:39 +0000</pubDate>
    </item>
    <item>
      <title>279be613-2914-4fb0-9528-eb8025c9c236</title>
      <link>https://db.gcve.eu/sighting/279be613-2914-4fb0-9528-eb8025c9c236/export</link>
      <description>{"uuid": "279be613-2914-4fb0-9528-eb8025c9c236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34730", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</description>
      <content:encoded>{"uuid": "279be613-2914-4fb0-9528-eb8025c9c236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34730", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/279be613-2914-4fb0-9528-eb8025c9c236/export</guid>
      <pubDate>Tue, 13 Sep 2022 22:25:39 +0000</pubDate>
    </item>
    <item>
      <title>7768bbb3-742b-402e-8abc-cc93e849ff11</title>
      <link>https://db.gcve.eu/sighting/7768bbb3-742b-402e-8abc-cc93e849ff11/export</link>
      <description>{"uuid": "7768bbb3-742b-402e-8abc-cc93e849ff11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34732", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</description>
      <content:encoded>{"uuid": "7768bbb3-742b-402e-8abc-cc93e849ff11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34732", "type": "seen", "source": "https://t.me/cibsecurity/49680", "content": "\u203c CVE-2022-34732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-13T22:25:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7768bbb3-742b-402e-8abc-cc93e849ff11/export</guid>
      <pubDate>Tue, 13 Sep 2022 22:25:39 +0000</pubDate>
    </item>
    <item>
      <title>12168a84-173b-4548-9100-bf85ab7d55c1</title>
      <link>https://db.gcve.eu/sighting/12168a84-173b-4548-9100-bf85ab7d55c1/export</link>
      <description>{"uuid": "12168a84-173b-4548-9100-bf85ab7d55c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3473", "type": "seen", "source": "https://t.me/cibsecurity/51300", "content": "\u203c CVE-2022-3473 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Human Resource Management System. This affects an unknown part of the file getstatecity.php. The manipulation of the argument ci leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-210717 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:19.000000Z"}</description>
      <content:encoded>{"uuid": "12168a84-173b-4548-9100-bf85ab7d55c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3473", "type": "seen", "source": "https://t.me/cibsecurity/51300", "content": "\u203c CVE-2022-3473 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Human Resource Management System. This affects an unknown part of the file getstatecity.php. The manipulation of the argument ci leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-210717 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/12168a84-173b-4548-9100-bf85ab7d55c1/export</guid>
      <pubDate>Thu, 13 Oct 2022 07:27:19 +0000</pubDate>
    </item>
  </channel>
</rss>
