<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 18:49:48 +0000</lastBuildDate>
    <item>
      <title>b9cda15e-ebbc-488b-9503-f4ca012d1151</title>
      <link>https://db.gcve.eu/sighting/b9cda15e-ebbc-488b-9503-f4ca012d1151/export</link>
      <description>{"uuid": "b9cda15e-ebbc-488b-9503-f4ca012d1151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36051", "type": "seen", "source": "https://t.me/cibsecurity/49152", "content": "\u203c CVE-2022-36051 \u203c\n\nZITADEL combines the ease of Auth0 and the versatility of Keycloak.**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role.`ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, **Actions** were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T02:37:15.000000Z"}</description>
      <content:encoded>{"uuid": "b9cda15e-ebbc-488b-9503-f4ca012d1151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36051", "type": "seen", "source": "https://t.me/cibsecurity/49152", "content": "\u203c CVE-2022-36051 \u203c\n\nZITADEL combines the ease of Auth0 and the versatility of Keycloak.**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role.`ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, **Actions** were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T02:37:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b9cda15e-ebbc-488b-9503-f4ca012d1151/export</guid>
      <pubDate>Thu, 01 Sep 2022 02:37:15 +0000</pubDate>
    </item>
    <item>
      <title>57563423-d683-4e92-955b-aa4f3ba56f81</title>
      <link>https://db.gcve.eu/sighting/57563423-d683-4e92-955b-aa4f3ba56f81/export</link>
      <description>{"uuid": "57563423-d683-4e92-955b-aa4f3ba56f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36053", "type": "seen", "source": "https://t.me/cibsecurity/49161", "content": "\u203c CVE-2022-36053 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_get_next_header casts a pointer to a uip_ext_hdr structure into the packet buffer at different offsets where extension headers are expected to be found, and then reads from this structure. Because of a lack of bounds checking, the casting can be done so that the structure extends beyond the packet's end. Hence, with a carefully crafted packet, it is possible to cause the Contiki-NG system to read data outside the packet buffer. A patch that fixes the vulnerability is included in Contiki-NG 4.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:01.000000Z"}</description>
      <content:encoded>{"uuid": "57563423-d683-4e92-955b-aa4f3ba56f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36053", "type": "seen", "source": "https://t.me/cibsecurity/49161", "content": "\u203c CVE-2022-36053 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_get_next_header casts a pointer to a uip_ext_hdr structure into the packet buffer at different offsets where extension headers are expected to be found, and then reads from this structure. Because of a lack of bounds checking, the casting can be done so that the structure extends beyond the packet's end. Hence, with a carefully crafted packet, it is possible to cause the Contiki-NG system to read data outside the packet buffer. A patch that fixes the vulnerability is included in Contiki-NG 4.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57563423-d683-4e92-955b-aa4f3ba56f81/export</guid>
      <pubDate>Thu, 01 Sep 2022 16:38:01 +0000</pubDate>
    </item>
    <item>
      <title>ba6f426f-1130-4f41-aa5a-b4172b89a9ac</title>
      <link>https://db.gcve.eu/sighting/ba6f426f-1130-4f41-aa5a-b4172b89a9ac/export</link>
      <description>{"uuid": "ba6f426f-1130-4f41-aa5a-b4172b89a9ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36055", "type": "seen", "source": "https://t.me/cibsecurity/49162", "content": "\u203c CVE-2022-36055 \u203c\n\nHelm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:03.000000Z"}</description>
      <content:encoded>{"uuid": "ba6f426f-1130-4f41-aa5a-b4172b89a9ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36055", "type": "seen", "source": "https://t.me/cibsecurity/49162", "content": "\u203c CVE-2022-36055 \u203c\n\nHelm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ba6f426f-1130-4f41-aa5a-b4172b89a9ac/export</guid>
      <pubDate>Thu, 01 Sep 2022 16:38:03 +0000</pubDate>
    </item>
    <item>
      <title>9121aa88-252b-4747-a02e-98c0ce56bb6f</title>
      <link>https://db.gcve.eu/sighting/9121aa88-252b-4747-a02e-98c0ce56bb6f/export</link>
      <description>{"uuid": "9121aa88-252b-4747-a02e-98c0ce56bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36054", "type": "seen", "source": "https://t.me/cibsecurity/49163", "content": "\u203c CVE-2022-36054 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a missing length check in the input function, it is possible to write outside the packet buffer's boundary. The vulnerability can be exploited by anyone who has the possibility to send 6LoWPAN packets to a Contiki-NG system. In particular, the vulnerability is exposed when sending either of two types of 6LoWPAN packets: an unfragmented packet or the first fragment of a fragmented packet. If the packet is sufficiently large, a subsequent memory copy will cause an out-of-bounds write with data supplied by the attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:04.000000Z"}</description>
      <content:encoded>{"uuid": "9121aa88-252b-4747-a02e-98c0ce56bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36054", "type": "seen", "source": "https://t.me/cibsecurity/49163", "content": "\u203c CVE-2022-36054 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a missing length check in the input function, it is possible to write outside the packet buffer's boundary. The vulnerability can be exploited by anyone who has the possibility to send 6LoWPAN packets to a Contiki-NG system. In particular, the vulnerability is exposed when sending either of two types of 6LoWPAN packets: an unfragmented packet or the first fragment of a fragmented packet. If the packet is sufficiently large, a subsequent memory copy will cause an out-of-bounds write with data supplied by the attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9121aa88-252b-4747-a02e-98c0ce56bb6f/export</guid>
      <pubDate>Thu, 01 Sep 2022 16:38:04 +0000</pubDate>
    </item>
    <item>
      <title>a128c330-de49-4a39-9321-5ab76bcf6a09</title>
      <link>https://db.gcve.eu/sighting/a128c330-de49-4a39-9321-5ab76bcf6a09/export</link>
      <description>{"uuid": "a128c330-de49-4a39-9321-5ab76bcf6a09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36052", "type": "seen", "source": "https://t.me/cibsecurity/49164", "content": "\u203c CVE-2022-36052 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header structure from the offset where the casting is made. Hence, it is possible to cause an out-of-bounds read beyond the packet buffer. The problem affects anyone running devices with Contiki-NG versions previous to 4.8, and which may receive 6LoWPAN packets from external parties. The problem has been patched in Contiki-NG version 4.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:06.000000Z"}</description>
      <content:encoded>{"uuid": "a128c330-de49-4a39-9321-5ab76bcf6a09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36052", "type": "seen", "source": "https://t.me/cibsecurity/49164", "content": "\u203c CVE-2022-36052 \u203c\n\nContiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header structure from the offset where the casting is made. Hence, it is possible to cause an out-of-bounds read beyond the packet buffer. The problem affects anyone running devices with Contiki-NG versions previous to 4.8, and which may receive 6LoWPAN packets from external parties. The problem has been patched in Contiki-NG version 4.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T16:38:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a128c330-de49-4a39-9321-5ab76bcf6a09/export</guid>
      <pubDate>Thu, 01 Sep 2022 16:38:06 +0000</pubDate>
    </item>
    <item>
      <title>fa0a369d-14dc-4737-8526-a1b14d93c462</title>
      <link>https://db.gcve.eu/sighting/fa0a369d-14dc-4737-8526-a1b14d93c462/export</link>
      <description>{"uuid": "fa0a369d-14dc-4737-8526-a1b14d93c462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36057", "type": "seen", "source": "https://t.me/cibsecurity/49373", "content": "\u203c CVE-2022-36057 \u203c\n\nDiscourse-Chat is an asynchronous messaging plugin for the Discourse open-source discussion platform. Users of Discourse Chat can be affected by admin users inserting HTML into chat titles and descriptions, causing a Cross-Site Scripting (XSS) attack. Version 0.9 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-07T00:13:21.000000Z"}</description>
      <content:encoded>{"uuid": "fa0a369d-14dc-4737-8526-a1b14d93c462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36057", "type": "seen", "source": "https://t.me/cibsecurity/49373", "content": "\u203c CVE-2022-36057 \u203c\n\nDiscourse-Chat is an asynchronous messaging plugin for the Discourse open-source discussion platform. Users of Discourse Chat can be affected by admin users inserting HTML into chat titles and descriptions, causing a Cross-Site Scripting (XSS) attack. Version 0.9 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-07T00:13:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fa0a369d-14dc-4737-8526-a1b14d93c462/export</guid>
      <pubDate>Wed, 07 Sep 2022 00:13:21 +0000</pubDate>
    </item>
    <item>
      <title>e6410c9b-2ed4-4148-b4c0-5d2a07094dc4</title>
      <link>https://db.gcve.eu/sighting/e6410c9b-2ed4-4148-b4c0-5d2a07094dc4/export</link>
      <description>{"uuid": "e6410c9b-2ed4-4148-b4c0-5d2a07094dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36058", "type": "seen", "source": "https://t.me/cibsecurity/49385", "content": "\u203c CVE-2022-36058 \u203c\n\nElrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.34, anyone who uses elrond-go to process blocks (historical or actual) could encounter a `MultiESDTNFTTransfer` transaction like this: `MultiESDTNFTTransfer` with a missing function name. Basic functionality like p2p messaging, storage, API requests and such are unaffected. Version 1.3.34 contains a fix for this issue. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-07T00:13:36.000000Z"}</description>
      <content:encoded>{"uuid": "e6410c9b-2ed4-4148-b4c0-5d2a07094dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36058", "type": "seen", "source": "https://t.me/cibsecurity/49385", "content": "\u203c CVE-2022-36058 \u203c\n\nElrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.34, anyone who uses elrond-go to process blocks (historical or actual) could encounter a `MultiESDTNFTTransfer` transaction like this: `MultiESDTNFTTransfer` with a missing function name. Basic functionality like p2p messaging, storage, API requests and such are unaffected. Version 1.3.34 contains a fix for this issue. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-07T00:13:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e6410c9b-2ed4-4148-b4c0-5d2a07094dc4/export</guid>
      <pubDate>Wed, 07 Sep 2022 00:13:36 +0000</pubDate>
    </item>
    <item>
      <title>eeabac66-c068-4575-82f6-b100c2836830</title>
      <link>https://db.gcve.eu/sighting/eeabac66-c068-4575-82f6-b100c2836830/export</link>
      <description>{"uuid": "eeabac66-c068-4575-82f6-b100c2836830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3605", "type": "seen", "source": "https://t.me/cibsecurity/54338", "content": "\u203c CVE-2022-3605 \u203c\n\nThe WP CSV Exporter WordPress plugin before 1.3.7 does not properly escape the fields when exporting data as CSV, leading to a CSV injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T20:21:01.000000Z"}</description>
      <content:encoded>{"uuid": "eeabac66-c068-4575-82f6-b100c2836830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3605", "type": "seen", "source": "https://t.me/cibsecurity/54338", "content": "\u203c CVE-2022-3605 \u203c\n\nThe WP CSV Exporter WordPress plugin before 1.3.7 does not properly escape the fields when exporting data as CSV, leading to a CSV injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T20:21:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eeabac66-c068-4575-82f6-b100c2836830/export</guid>
      <pubDate>Mon, 12 Dec 2022 20:21:01 +0000</pubDate>
    </item>
    <item>
      <title>1e9321e0-077f-45c3-8506-c1ab9a5fecc0</title>
      <link>https://db.gcve.eu/sighting/1e9321e0-077f-45c3-8506-c1ab9a5fecc0/export</link>
      <description>{"uuid": "1e9321e0-077f-45c3-8506-c1ab9a5fecc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36059", "type": "seen", "source": "https://t.me/cibsecurity/60941", "content": "\u203c CVE-2022-36059 \u203c\n\nmatrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 19.4.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This issue has been fixed in matrix-js-sdk 19.4.0 and users are advised to upgrade. Users unable to upgrade may mitigate this issue by redacting applicable events, waiting for the sync processor to store data, and restarting the client. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues. In some cases, no workarounds are possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:40:05.000000Z"}</description>
      <content:encoded>{"uuid": "1e9321e0-077f-45c3-8506-c1ab9a5fecc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36059", "type": "seen", "source": "https://t.me/cibsecurity/60941", "content": "\u203c CVE-2022-36059 \u203c\n\nmatrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 19.4.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This issue has been fixed in matrix-js-sdk 19.4.0 and users are advised to upgrade. Users unable to upgrade may mitigate this issue by redacting applicable events, waiting for the sync processor to store data, and restarting the client. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues. In some cases, no workarounds are possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:40:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1e9321e0-077f-45c3-8506-c1ab9a5fecc0/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:40:05 +0000</pubDate>
    </item>
    <item>
      <title>d0f59dcf-8c05-40aa-8963-cbc5afabdaf7</title>
      <link>https://db.gcve.eu/sighting/d0f59dcf-8c05-40aa-8963-cbc5afabdaf7/export</link>
      <description>{"uuid": "d0f59dcf-8c05-40aa-8963-cbc5afabdaf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3605", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12858", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3605\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP CSV Exporter WordPress plugin before 1.3.7 does not properly escape the fields when exporting data as CSV, leading to a CSV injection vulnerability.\n\ud83d\udccf Published: 2022-12-12T17:54:46.747Z\n\ud83d\udccf Modified: 2025-04-22T14:54:28.508Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2", "creation_timestamp": "2025-04-22T15:03:34.000000Z"}</description>
      <content:encoded>{"uuid": "d0f59dcf-8c05-40aa-8963-cbc5afabdaf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3605", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12858", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3605\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP CSV Exporter WordPress plugin before 1.3.7 does not properly escape the fields when exporting data as CSV, leading to a CSV injection vulnerability.\n\ud83d\udccf Published: 2022-12-12T17:54:46.747Z\n\ud83d\udccf Modified: 2025-04-22T14:54:28.508Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2", "creation_timestamp": "2025-04-22T15:03:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d0f59dcf-8c05-40aa-8963-cbc5afabdaf7/export</guid>
      <pubDate>Tue, 22 Apr 2025 15:03:34 +0000</pubDate>
    </item>
  </channel>
</rss>
