<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 05:17:07 +0000</lastBuildDate>
    <item>
      <title>a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b</title>
      <link>https://db.gcve.eu/sighting/a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b/export</link>
      <description>{"uuid": "a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "seen", "source": "https://t.me/cibsecurity/54035", "content": "\u203c CVE-2022-44039 \u203c\n\nFranklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00c2\u00b6\u00c2\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:28.000000Z"}</description>
      <content:encoded>{"uuid": "a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "seen", "source": "https://t.me/cibsecurity/54035", "content": "\u203c CVE-2022-44039 \u203c\n\nFranklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00c2\u00b6\u00c2\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a7d4f32a-a9b4-4e91-92a5-b0dea9805e7b/export</guid>
      <pubDate>Tue, 06 Dec 2022 00:40:28 +0000</pubDate>
    </item>
    <item>
      <title>2ca59afb-785a-484e-b00e-01709f5e6cbf</title>
      <link>https://db.gcve.eu/sighting/2ca59afb-785a-484e-b00e-01709f5e6cbf/export</link>
      <description>{"uuid": "2ca59afb-785a-484e-b00e-01709f5e6cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44030", "type": "seen", "source": "https://t.me/cibsecurity/54110", "content": "\u203c CVE-2022-44030 \u203c\n\nRedmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T02:41:04.000000Z"}</description>
      <content:encoded>{"uuid": "2ca59afb-785a-484e-b00e-01709f5e6cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44030", "type": "seen", "source": "https://t.me/cibsecurity/54110", "content": "\u203c CVE-2022-44030 \u203c\n\nRedmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T02:41:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2ca59afb-785a-484e-b00e-01709f5e6cbf/export</guid>
      <pubDate>Wed, 07 Dec 2022 02:41:04 +0000</pubDate>
    </item>
    <item>
      <title>8917d31f-1e54-4ffa-b28f-1702bfb2027c</title>
      <link>https://db.gcve.eu/sighting/8917d31f-1e54-4ffa-b28f-1702bfb2027c/export</link>
      <description>{"uuid": "8917d31f-1e54-4ffa-b28f-1702bfb2027c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4403", "type": "seen", "source": "https://t.me/cibsecurity/54264", "content": "\u203c CVE-2022-4403 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Canteen Management System. This vulnerability affects unknown code of the file ajax_represent.php. The manipulation of the argument customer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215272.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-11T18:20:13.000000Z"}</description>
      <content:encoded>{"uuid": "8917d31f-1e54-4ffa-b28f-1702bfb2027c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4403", "type": "seen", "source": "https://t.me/cibsecurity/54264", "content": "\u203c CVE-2022-4403 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Canteen Management System. This vulnerability affects unknown code of the file ajax_represent.php. The manipulation of the argument customer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215272.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-11T18:20:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8917d31f-1e54-4ffa-b28f-1702bfb2027c/export</guid>
      <pubDate>Sun, 11 Dec 2022 18:20:13 +0000</pubDate>
    </item>
    <item>
      <title>f87eb5e9-4555-4530-a9b7-1757be5a3dd4</title>
      <link>https://db.gcve.eu/sighting/f87eb5e9-4555-4530-a9b7-1757be5a3dd4/export</link>
      <description>{"uuid": "f87eb5e9-4555-4530-a9b7-1757be5a3dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/cibsecurity/54266", "content": "\u203c CVE-2022-44031 \u203c\n\nRedmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T07:20:37.000000Z"}</description>
      <content:encoded>{"uuid": "f87eb5e9-4555-4530-a9b7-1757be5a3dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/cibsecurity/54266", "content": "\u203c CVE-2022-44031 \u203c\n\nRedmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T07:20:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f87eb5e9-4555-4530-a9b7-1757be5a3dd4/export</guid>
      <pubDate>Mon, 12 Dec 2022 07:20:37 +0000</pubDate>
    </item>
    <item>
      <title>f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d</title>
      <link>https://db.gcve.eu/sighting/f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d/export</link>
      <description>{"uuid": "f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44036", "type": "seen", "source": "https://t.me/cibsecurity/55842", "content": "\u203c CVE-2022-44036 \u203c\n\nRESERVED There is an arbitrary file upload vulnerability in b2evolution v7.2.5. Attackers can use this vulnerability to execute remote commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T00:17:53.000000Z"}</description>
      <content:encoded>{"uuid": "f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44036", "type": "seen", "source": "https://t.me/cibsecurity/55842", "content": "\u203c CVE-2022-44036 \u203c\n\nRESERVED There is an arbitrary file upload vulnerability in b2evolution v7.2.5. Attackers can use this vulnerability to execute remote commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T00:17:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f87cdd3d-4294-4848-8c8c-dd92b7dbfb7d/export</guid>
      <pubDate>Wed, 04 Jan 2023 00:17:53 +0000</pubDate>
    </item>
    <item>
      <title>10f7c679-3c7d-4f09-adcc-eb4086b4489b</title>
      <link>https://db.gcve.eu/sighting/10f7c679-3c7d-4f09-adcc-eb4086b4489b/export</link>
      <description>{"uuid": "10f7c679-3c7d-4f09-adcc-eb4086b4489b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44031\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Redmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\ud83d\udccf Published: 2022-12-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:35:00.372Z\n\ud83d\udd17 References:\n1. https://www.redmine.org/projects/redmine/wiki/Security_Advisories", "creation_timestamp": "2025-04-22T21:04:22.000000Z"}</description>
      <content:encoded>{"uuid": "10f7c679-3c7d-4f09-adcc-eb4086b4489b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44031", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44031\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Redmine before 4.2.9 and 5.0.x before 5.0.4 allows persistent XSS in its Textile formatter due to improper sanitization of the blockquote syntax in Textile-formatted fields.\n\ud83d\udccf Published: 2022-12-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:35:00.372Z\n\ud83d\udd17 References:\n1. https://www.redmine.org/projects/redmine/wiki/Security_Advisories", "creation_timestamp": "2025-04-22T21:04:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/10f7c679-3c7d-4f09-adcc-eb4086b4489b/export</guid>
      <pubDate>Tue, 22 Apr 2025 21:04:22 +0000</pubDate>
    </item>
    <item>
      <title>b72550f2-cab7-43bf-9b60-9b125a369b53</title>
      <link>https://db.gcve.eu/sighting/b72550f2-cab7-43bf-9b60-9b125a369b53/export</link>
      <description>{"uuid": "b72550f2-cab7-43bf-9b60-9b125a369b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44039\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Franklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00b6\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:55:15.058Z\n\ud83d\udd17 References:\n1. https://pastebin.com/raw/64stbsWu", "creation_timestamp": "2025-04-24T14:05:48.000000Z"}</description>
      <content:encoded>{"uuid": "b72550f2-cab7-43bf-9b60-9b125a369b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44039", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44039\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Franklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). \u00b6\u00b6 An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of \"fopen\" system function with the mode \"wb\" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:55:15.058Z\n\ud83d\udd17 References:\n1. https://pastebin.com/raw/64stbsWu", "creation_timestamp": "2025-04-24T14:05:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b72550f2-cab7-43bf-9b60-9b125a369b53/export</guid>
      <pubDate>Thu, 24 Apr 2025 14:05:48 +0000</pubDate>
    </item>
    <item>
      <title>620461bd-e981-474e-978a-965d176e0756</title>
      <link>https://db.gcve.eu/sighting/620461bd-e981-474e-978a-965d176e0756/export</link>
      <description>{"uuid": "620461bd-e981-474e-978a-965d176e0756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44033", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "620461bd-e981-474e-978a-965d176e0756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44033", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/620461bd-e981-474e-978a-965d176e0756/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>0a6a6b82-b7eb-41f8-a892-738820cd84bb</title>
      <link>https://db.gcve.eu/sighting/0a6a6b82-b7eb-41f8-a892-738820cd84bb/export</link>
      <description>{"uuid": "0a6a6b82-b7eb-41f8-a892-738820cd84bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44034", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0a6a6b82-b7eb-41f8-a892-738820cd84bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44034", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0a6a6b82-b7eb-41f8-a892-738820cd84bb/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>45b06ed4-467d-4a09-8739-3624d730b3e4</title>
      <link>https://db.gcve.eu/sighting/45b06ed4-467d-4a09-8739-3624d730b3e4/export</link>
      <description>{"uuid": "45b06ed4-467d-4a09-8739-3624d730b3e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44032", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "45b06ed4-467d-4a09-8739-3624d730b3e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-44032", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/45b06ed4-467d-4a09-8739-3624d730b3e4/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
