<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 18 May 2026 10:51:25 +0000</lastBuildDate>
    <item>
      <title>2fdbab63-c9ce-4ad0-8b66-cd8ea81f73be</title>
      <link>https://db.gcve.eu/sighting/2fdbab63-c9ce-4ad0-8b66-cd8ea81f73be/export</link>
      <description>{"uuid": "2fdbab63-c9ce-4ad0-8b66-cd8ea81f73be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/167082", "content": "https://ift.tt/vqQB2jz\nCVE-2022-4961", "creation_timestamp": "2024-01-12T06:36:59.000000Z"}</description>
      <content:encoded>{"uuid": "2fdbab63-c9ce-4ad0-8b66-cd8ea81f73be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/167082", "content": "https://ift.tt/vqQB2jz\nCVE-2022-4961", "creation_timestamp": "2024-01-12T06:36:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2fdbab63-c9ce-4ad0-8b66-cd8ea81f73be/export</guid>
      <pubDate>Fri, 12 Jan 2024 06:36:59 +0000</pubDate>
    </item>
    <item>
      <title>1f38a9ab-0361-4f12-b0ce-1a595eb85485</title>
      <link>https://db.gcve.eu/sighting/1f38a9ab-0361-4f12-b0ce-1a595eb85485/export</link>
      <description>{"uuid": "1f38a9ab-0361-4f12-b0ce-1a595eb85485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/169992", "content": "https://ift.tt/zLtS9lk\nCVE-2022-4961 Exploit", "creation_timestamp": "2024-01-18T23:17:08.000000Z"}</description>
      <content:encoded>{"uuid": "1f38a9ab-0361-4f12-b0ce-1a595eb85485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/169992", "content": "https://ift.tt/zLtS9lk\nCVE-2022-4961 Exploit", "creation_timestamp": "2024-01-18T23:17:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1f38a9ab-0361-4f12-b0ce-1a595eb85485/export</guid>
      <pubDate>Thu, 18 Jan 2024 23:17:08 +0000</pubDate>
    </item>
    <item>
      <title>e9008860-a830-4139-a4f6-adf6b41a8f73</title>
      <link>https://db.gcve.eu/sighting/e9008860-a830-4139-a4f6-adf6b41a8f73/export</link>
      <description>{"uuid": "e9008860-a830-4139-a4f6-adf6b41a8f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/174875", "content": "https://ift.tt/KwB1noj\nCVE-2022-4961 | Weitong Mall 1.0.0 OrderDao.xml sidx/order sql injection (I5XC79)", "creation_timestamp": "2024-01-28T09:56:40.000000Z"}</description>
      <content:encoded>{"uuid": "e9008860-a830-4139-a4f6-adf6b41a8f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4961", "type": "seen", "source": "https://t.me/ctinow/174875", "content": "https://ift.tt/KwB1noj\nCVE-2022-4961 | Weitong Mall 1.0.0 OrderDao.xml sidx/order sql injection (I5XC79)", "creation_timestamp": "2024-01-28T09:56:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e9008860-a830-4139-a4f6-adf6b41a8f73/export</guid>
      <pubDate>Sun, 28 Jan 2024 09:56:40 +0000</pubDate>
    </item>
    <item>
      <title>79f448bc-9ff2-4c14-b5e8-0cbfa6f36b88</title>
      <link>https://db.gcve.eu/sighting/79f448bc-9ff2-4c14-b5e8-0cbfa6f36b88/export</link>
      <description>{"uuid": "79f448bc-9ff2-4c14-b5e8-0cbfa6f36b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49616", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49616\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt7*-sdw: harden jack_detect_handler\n\nRealtek headset codec drivers typically check if the card is\ninstantiated before proceeding with the jack detection.\n\nThe rt700, rt711 and rt711-sdca are however missing a check on the\ncard pointer, which can lead to NULL dereferences encountered in\ndriver bind/unbind tests.\n\ud83d\udccf Published: 2025-02-26T02:23:36.180Z\n\ud83d\udccf Modified: 2025-03-14T12:19:05.256Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/07a606e1389a63b61cb8cd591026f30529117573\n2. https://git.kernel.org/stable/c/1d75b73ec6d6b705cca528b36d8315e43e8d7fa5\n3. https://git.kernel.org/stable/c/0484271ab0ce50649329fa9dc23c50853c5b26a4", "creation_timestamp": "2025-03-14T12:49:10.000000Z"}</description>
      <content:encoded>{"uuid": "79f448bc-9ff2-4c14-b5e8-0cbfa6f36b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49616", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49616\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt7*-sdw: harden jack_detect_handler\n\nRealtek headset codec drivers typically check if the card is\ninstantiated before proceeding with the jack detection.\n\nThe rt700, rt711 and rt711-sdca are however missing a check on the\ncard pointer, which can lead to NULL dereferences encountered in\ndriver bind/unbind tests.\n\ud83d\udccf Published: 2025-02-26T02:23:36.180Z\n\ud83d\udccf Modified: 2025-03-14T12:19:05.256Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/07a606e1389a63b61cb8cd591026f30529117573\n2. https://git.kernel.org/stable/c/1d75b73ec6d6b705cca528b36d8315e43e8d7fa5\n3. https://git.kernel.org/stable/c/0484271ab0ce50649329fa9dc23c50853c5b26a4", "creation_timestamp": "2025-03-14T12:49:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/79f448bc-9ff2-4c14-b5e8-0cbfa6f36b88/export</guid>
      <pubDate>Fri, 14 Mar 2025 12:49:10 +0000</pubDate>
    </item>
    <item>
      <title>fdadc8e3-8792-4b74-bec0-13cf0dc6a96d</title>
      <link>https://db.gcve.eu/sighting/fdadc8e3-8792-4b74-bec0-13cf0dc6a96d/export</link>
      <description>{"uuid": "fdadc8e3-8792-4b74-bec0-13cf0dc6a96d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49615", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7542", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49615\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error\n\nThe initial settings will be written before the codec probe function.\nBut, the rt711-&amp;gt;component doesn't be assigned yet.\nIf IO error happened during initial settings operations, it will cause the kernel panic.\nThis patch changed component-&amp;gt;dev to slave-&amp;gt;dev to fix this issue.\n\ud83d\udccf Published: 2025-02-26T02:23:35.696Z\n\ud83d\udccf Modified: 2025-03-14T12:19:04.091Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06\n2. https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b\n3. https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99", "creation_timestamp": "2025-03-14T12:49:11.000000Z"}</description>
      <content:encoded>{"uuid": "fdadc8e3-8792-4b74-bec0-13cf0dc6a96d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49615", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7542", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49615\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error\n\nThe initial settings will be written before the codec probe function.\nBut, the rt711-&amp;gt;component doesn't be assigned yet.\nIf IO error happened during initial settings operations, it will cause the kernel panic.\nThis patch changed component-&amp;gt;dev to slave-&amp;gt;dev to fix this issue.\n\ud83d\udccf Published: 2025-02-26T02:23:35.696Z\n\ud83d\udccf Modified: 2025-03-14T12:19:04.091Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06\n2. https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b\n3. https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99", "creation_timestamp": "2025-03-14T12:49:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fdadc8e3-8792-4b74-bec0-13cf0dc6a96d/export</guid>
      <pubDate>Fri, 14 Mar 2025 12:49:11 +0000</pubDate>
    </item>
    <item>
      <title>2c7d133b-770f-48a2-8d42-41e3210358b1</title>
      <link>https://db.gcve.eu/sighting/2c7d133b-770f-48a2-8d42-41e3210358b1/export</link>
      <description>{"uuid": "2c7d133b-770f-48a2-8d42-41e3210358b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49610", "type": "seen", "source": "https://bsky.app/profile/secqube.com/post/3m3woffkuii2s", "content": "", "creation_timestamp": "2025-10-24T10:34:06.004704Z"}</description>
      <content:encoded>{"uuid": "2c7d133b-770f-48a2-8d42-41e3210358b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49610", "type": "seen", "source": "https://bsky.app/profile/secqube.com/post/3m3woffkuii2s", "content": "", "creation_timestamp": "2025-10-24T10:34:06.004704Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c7d133b-770f-48a2-8d42-41e3210358b1/export</guid>
      <pubDate>Fri, 24 Oct 2025 10:34:06 +0000</pubDate>
    </item>
    <item>
      <title>690f3a6a-a74e-4cb3-bbd2-c6607f333e39</title>
      <link>https://db.gcve.eu/sighting/690f3a6a-a74e-4cb3-bbd2-c6607f333e39/export</link>
      <description>{"uuid": "690f3a6a-a74e-4cb3-bbd2-c6607f333e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49610", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "690f3a6a-a74e-4cb3-bbd2-c6607f333e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49610", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/690f3a6a-a74e-4cb3-bbd2-c6607f333e39/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>f65ee07d-174b-48a0-9661-535a24aa6097</title>
      <link>https://db.gcve.eu/sighting/f65ee07d-174b-48a0-9661-535a24aa6097/export</link>
      <description>{"uuid": "f65ee07d-174b-48a0-9661-535a24aa6097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49618", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "f65ee07d-174b-48a0-9661-535a24aa6097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49618", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f65ee07d-174b-48a0-9661-535a24aa6097/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
  </channel>
</rss>
