<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:46:07 +0000</lastBuildDate>
    <item>
      <title>ce55b7c7-692b-461f-8e68-f64ddf4f9c4e</title>
      <link>https://db.gcve.eu/sighting/ce55b7c7-692b-461f-8e68-f64ddf4f9c4e/export</link>
      <description>{"uuid": "ce55b7c7-692b-461f-8e68-f64ddf4f9c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21785", "type": "seen", "source": "https://t.me/cibsecurity/45654", "content": "\u203c CVE-2022-21785 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06807363; Issue ID: ALPS06807363.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:19.000000Z"}</description>
      <content:encoded>{"uuid": "ce55b7c7-692b-461f-8e68-f64ddf4f9c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21785", "type": "seen", "source": "https://t.me/cibsecurity/45654", "content": "\u203c CVE-2022-21785 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06807363; Issue ID: ALPS06807363.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ce55b7c7-692b-461f-8e68-f64ddf4f9c4e/export</guid>
      <pubDate>Wed, 06 Jul 2022 18:14:19 +0000</pubDate>
    </item>
    <item>
      <title>d8ddf26d-13d5-4634-99ca-9ab442fc8fac</title>
      <link>https://db.gcve.eu/sighting/d8ddf26d-13d5-4634-99ca-9ab442fc8fac/export</link>
      <description>{"uuid": "d8ddf26d-13d5-4634-99ca-9ab442fc8fac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21780", "type": "seen", "source": "https://t.me/cibsecurity/45658", "content": "\u203c CVE-2022-21780 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704526.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:24.000000Z"}</description>
      <content:encoded>{"uuid": "d8ddf26d-13d5-4634-99ca-9ab442fc8fac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21780", "type": "seen", "source": "https://t.me/cibsecurity/45658", "content": "\u203c CVE-2022-21780 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704526.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d8ddf26d-13d5-4634-99ca-9ab442fc8fac/export</guid>
      <pubDate>Wed, 06 Jul 2022 18:14:24 +0000</pubDate>
    </item>
    <item>
      <title>765605bd-0362-40a4-bef2-55b6c582e4f9</title>
      <link>https://db.gcve.eu/sighting/765605bd-0362-40a4-bef2-55b6c582e4f9/export</link>
      <description>{"uuid": "765605bd-0362-40a4-bef2-55b6c582e4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21782", "type": "seen", "source": "https://t.me/cibsecurity/45664", "content": "\u203c CVE-2022-21782 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704508.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:31.000000Z"}</description>
      <content:encoded>{"uuid": "765605bd-0362-40a4-bef2-55b6c582e4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21782", "type": "seen", "source": "https://t.me/cibsecurity/45664", "content": "\u203c CVE-2022-21782 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704508.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/765605bd-0362-40a4-bef2-55b6c582e4f9/export</guid>
      <pubDate>Wed, 06 Jul 2022 18:14:31 +0000</pubDate>
    </item>
    <item>
      <title>43c03732-6e07-46f1-9313-15501d3bad8f</title>
      <link>https://db.gcve.eu/sighting/43c03732-6e07-46f1-9313-15501d3bad8f/export</link>
      <description>{"uuid": "43c03732-6e07-46f1-9313-15501d3bad8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21783", "type": "seen", "source": "https://t.me/cibsecurity/45667", "content": "\u203c CVE-2022-21783 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704482.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:34.000000Z"}</description>
      <content:encoded>{"uuid": "43c03732-6e07-46f1-9313-15501d3bad8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21783", "type": "seen", "source": "https://t.me/cibsecurity/45667", "content": "\u203c CVE-2022-21783 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704482.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/43c03732-6e07-46f1-9313-15501d3bad8f/export</guid>
      <pubDate>Wed, 06 Jul 2022 18:14:34 +0000</pubDate>
    </item>
    <item>
      <title>c64f7222-606c-464b-812e-ce6a29c399fb</title>
      <link>https://db.gcve.eu/sighting/c64f7222-606c-464b-812e-ce6a29c399fb/export</link>
      <description>{"uuid": "c64f7222-606c-464b-812e-ce6a29c399fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21781", "type": "seen", "source": "https://t.me/cibsecurity/45670", "content": "\u203c CVE-2022-21781 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704433.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:37.000000Z"}</description>
      <content:encoded>{"uuid": "c64f7222-606c-464b-812e-ce6a29c399fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21781", "type": "seen", "source": "https://t.me/cibsecurity/45670", "content": "\u203c CVE-2022-21781 \u203c\n\nIn WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704433.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T18:14:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c64f7222-606c-464b-812e-ce6a29c399fb/export</guid>
      <pubDate>Wed, 06 Jul 2022 18:14:37 +0000</pubDate>
    </item>
    <item>
      <title>62110bc6-c9c9-4bab-a15e-7fb96b5499d8</title>
      <link>https://db.gcve.eu/sighting/62110bc6-c9c9-4bab-a15e-7fb96b5499d8/export</link>
      <description>{"uuid": "62110bc6-c9c9-4bab-a15e-7fb96b5499d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21789", "type": "seen", "source": "https://t.me/cibsecurity/47332", "content": "\u203c CVE-2022-21789 \u203c\n\nIn audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:16:56.000000Z"}</description>
      <content:encoded>{"uuid": "62110bc6-c9c9-4bab-a15e-7fb96b5499d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21789", "type": "seen", "source": "https://t.me/cibsecurity/47332", "content": "\u203c CVE-2022-21789 \u203c\n\nIn audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:16:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/62110bc6-c9c9-4bab-a15e-7fb96b5499d8/export</guid>
      <pubDate>Mon, 01 Aug 2022 18:16:56 +0000</pubDate>
    </item>
    <item>
      <title>322d8fd5-d903-4c5a-b8f7-47d6ee8268fd</title>
      <link>https://db.gcve.eu/sighting/322d8fd5-d903-4c5a-b8f7-47d6ee8268fd/export</link>
      <description>{"uuid": "322d8fd5-d903-4c5a-b8f7-47d6ee8268fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21788", "type": "seen", "source": "https://t.me/cibsecurity/47346", "content": "\u203c CVE-2022-21788 \u203c\n\nIn scp, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06988728; Issue ID: ALPS06988728.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:17:12.000000Z"}</description>
      <content:encoded>{"uuid": "322d8fd5-d903-4c5a-b8f7-47d6ee8268fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21788", "type": "seen", "source": "https://t.me/cibsecurity/47346", "content": "\u203c CVE-2022-21788 \u203c\n\nIn scp, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06988728; Issue ID: ALPS06988728.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T18:17:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/322d8fd5-d903-4c5a-b8f7-47d6ee8268fd/export</guid>
      <pubDate>Mon, 01 Aug 2022 18:17:12 +0000</pubDate>
    </item>
  </channel>
</rss>
