<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 15:40:51 +0000</lastBuildDate>
    <item>
      <title>4db96d78-90dc-4df8-8bc1-040e3f01cdf3</title>
      <link>https://db.gcve.eu/sighting/4db96d78-90dc-4df8-8bc1-040e3f01cdf3/export</link>
      <description>{"uuid": "4db96d78-90dc-4df8-8bc1-040e3f01cdf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/cibsecurity/48223", "content": "\u203c CVE-2022-38362 \u203c\n\nApache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T18:39:07.000000Z"}</description>
      <content:encoded>{"uuid": "4db96d78-90dc-4df8-8bc1-040e3f01cdf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/cibsecurity/48223", "content": "\u203c CVE-2022-38362 \u203c\n\nApache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-16T18:39:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4db96d78-90dc-4df8-8bc1-040e3f01cdf3/export</guid>
      <pubDate>Tue, 16 Aug 2022 18:39:07 +0000</pubDate>
    </item>
    <item>
      <title>ae0e4f1b-b9f9-465d-a3d7-14d8e628c886</title>
      <link>https://db.gcve.eu/sighting/ae0e4f1b-b9f9-465d-a3d7-14d8e628c886/export</link>
      <description>{"uuid": "ae0e4f1b-b9f9-465d-a3d7-14d8e628c886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/ctinow/68265", "content": "Internet Bug Bounty: CVE-2022-38362: Apache Airflow Docker Provider &amp;lt;3.0 RCE vulnerability in example dag\n\nhttps://ift.tt/IVXMqKA", "creation_timestamp": "2022-10-10T22:26:50.000000Z"}</description>
      <content:encoded>{"uuid": "ae0e4f1b-b9f9-465d-a3d7-14d8e628c886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38362", "type": "seen", "source": "https://t.me/ctinow/68265", "content": "Internet Bug Bounty: CVE-2022-38362: Apache Airflow Docker Provider &amp;lt;3.0 RCE vulnerability in example dag\n\nhttps://ift.tt/IVXMqKA", "creation_timestamp": "2022-10-10T22:26:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ae0e4f1b-b9f9-465d-a3d7-14d8e628c886/export</guid>
      <pubDate>Mon, 10 Oct 2022 22:26:50 +0000</pubDate>
    </item>
  </channel>
</rss>
