<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:19:56 +0000</lastBuildDate>
    <item>
      <title>5f6f122e-1561-4bf6-acdb-ca39a8bb6be2</title>
      <link>https://db.gcve.eu/sighting/5f6f122e-1561-4bf6-acdb-ca39a8bb6be2/export</link>
      <description>{"uuid": "5f6f122e-1561-4bf6-acdb-ca39a8bb6be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/cibsecurity/52434", "content": "\u203c CVE-2022-42788 \u203c\n\nA permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T23:23:58.000000Z"}</description>
      <content:encoded>{"uuid": "5f6f122e-1561-4bf6-acdb-ca39a8bb6be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/cibsecurity/52434", "content": "\u203c CVE-2022-42788 \u203c\n\nA permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T23:23:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5f6f122e-1561-4bf6-acdb-ca39a8bb6be2/export</guid>
      <pubDate>Tue, 01 Nov 2022 23:23:58 +0000</pubDate>
    </item>
    <item>
      <title>5a2ead7b-b078-4fd6-b275-392f8e59d3e6</title>
      <link>https://db.gcve.eu/sighting/5a2ead7b-b078-4fd6-b275-392f8e59d3e6/export</link>
      <description>{"uuid": "5a2ead7b-b078-4fd6-b275-392f8e59d3e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/cibsecurity/52878", "content": "\u203c CVE-2022-42786 \u203c\n\nMultiple W&amp;amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:39:29.000000Z"}</description>
      <content:encoded>{"uuid": "5a2ead7b-b078-4fd6-b275-392f8e59d3e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/cibsecurity/52878", "content": "\u203c CVE-2022-42786 \u203c\n\nMultiple W&amp;amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:39:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5a2ead7b-b078-4fd6-b275-392f8e59d3e6/export</guid>
      <pubDate>Sun, 13 Nov 2022 05:39:29 +0000</pubDate>
    </item>
    <item>
      <title>7d5f3e42-78ad-41fe-8633-61c1abc24f2d</title>
      <link>https://db.gcve.eu/sighting/7d5f3e42-78ad-41fe-8633-61c1abc24f2d/export</link>
      <description>{"uuid": "7d5f3e42-78ad-41fe-8633-61c1abc24f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42784", "type": "seen", "source": "https://t.me/ctinow/161676", "content": "https://ift.tt/K9hNx3S\nCVE-2022-42784 | Siemens LOGO 12 unknown vulnerability (ssa-844582)", "creation_timestamp": "2024-01-02T11:06:50.000000Z"}</description>
      <content:encoded>{"uuid": "7d5f3e42-78ad-41fe-8633-61c1abc24f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42784", "type": "seen", "source": "https://t.me/ctinow/161676", "content": "https://ift.tt/K9hNx3S\nCVE-2022-42784 | Siemens LOGO 12 unknown vulnerability (ssa-844582)", "creation_timestamp": "2024-01-02T11:06:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7d5f3e42-78ad-41fe-8633-61c1abc24f2d/export</guid>
      <pubDate>Tue, 02 Jan 2024 11:06:50 +0000</pubDate>
    </item>
    <item>
      <title>671dcd5a-d4c4-4ffa-bd61-8d9234bb959d</title>
      <link>https://db.gcve.eu/sighting/671dcd5a-d4c4-4ffa-bd61-8d9234bb959d/export</link>
      <description>{"uuid": "671dcd5a-d4c4-4ffa-bd61-8d9234bb959d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42786\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple W&amp;amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\ud83d\udccf Published: 2022-11-10T11:02:32.615Z\n\ud83d\udccf Modified: 2025-04-29T14:56:50.373Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-04-29T15:11:40.000000Z"}</description>
      <content:encoded>{"uuid": "671dcd5a-d4c4-4ffa-bd61-8d9234bb959d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42786", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42786\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Multiple W&amp;amp;T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\ud83d\udccf Published: 2022-11-10T11:02:32.615Z\n\ud83d\udccf Modified: 2025-04-29T14:56:50.373Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-04-29T15:11:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/671dcd5a-d4c4-4ffa-bd61-8d9234bb959d/export</guid>
      <pubDate>Tue, 29 Apr 2025 15:11:40 +0000</pubDate>
    </item>
    <item>
      <title>7202b646-66bd-4a8f-bd83-acefd7ca0c51</title>
      <link>https://db.gcve.eu/sighting/7202b646-66bd-4a8f-bd83-acefd7ca0c51/export</link>
      <description>{"uuid": "7202b646-66bd-4a8f-bd83-acefd7ca0c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42785", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42785\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;amp;T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.\n\ud83d\udccf Published: 2022-11-10T11:01:41.011Z\n\ud83d\udccf Modified: 2025-05-01T19:02:00.365Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-05-01T19:14:56.000000Z"}</description>
      <content:encoded>{"uuid": "7202b646-66bd-4a8f-bd83-acefd7ca0c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42785", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42785\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;amp;T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.\n\ud83d\udccf Published: 2022-11-10T11:01:41.011Z\n\ud83d\udccf Modified: 2025-05-01T19:02:00.365Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043/", "creation_timestamp": "2025-05-01T19:14:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7202b646-66bd-4a8f-bd83-acefd7ca0c51/export</guid>
      <pubDate>Thu, 01 May 2025 19:14:56 +0000</pubDate>
    </item>
    <item>
      <title>1891a066-a7cc-4027-930d-4859225e7d06</title>
      <link>https://db.gcve.eu/sighting/1891a066-a7cc-4027-930d-4859225e7d06/export</link>
      <description>{"uuid": "1891a066-a7cc-4027-930d-4859225e7d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42787", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14374", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42787\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\n\ud83d\udccf Published: 2022-11-10T11:06:20.856Z\n\ud83d\udccf Modified: 2025-05-01T19:01:20.740Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043", "creation_timestamp": "2025-05-01T19:14:57.000000Z"}</description>
      <content:encoded>{"uuid": "1891a066-a7cc-4027-930d-4859225e7d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42787", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14374", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42787\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple W&amp;amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\n\ud83d\udccf Published: 2022-11-10T11:06:20.856Z\n\ud83d\udccf Modified: 2025-05-01T19:01:20.740Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/de/advisories/VDE-2022-043", "creation_timestamp": "2025-05-01T19:14:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1891a066-a7cc-4027-930d-4859225e7d06/export</guid>
      <pubDate>Thu, 01 May 2025 19:14:57 +0000</pubDate>
    </item>
    <item>
      <title>3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f</title>
      <link>https://db.gcve.eu/sighting/3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f/export</link>
      <description>{"uuid": "3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42788\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T19:07:30.470Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488", "creation_timestamp": "2025-05-05T19:20:35.000000Z"}</description>
      <content:encoded>{"uuid": "3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42788\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in macOS Ventura 13. A malicious application may be able to read sensitive location information.\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T19:07:30.470Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213488", "creation_timestamp": "2025-05-05T19:20:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3d9df3ed-e28d-48f4-af2c-d92e25ea7d8f/export</guid>
      <pubDate>Mon, 05 May 2025 19:20:35 +0000</pubDate>
    </item>
  </channel>
</rss>
