<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:27:26 +0000</lastBuildDate>
    <item>
      <title>ab4f2b69-4eb0-4b40-813b-21c594bf00ec</title>
      <link>https://db.gcve.eu/sighting/ab4f2b69-4eb0-4b40-813b-21c594bf00ec/export</link>
      <description>{"uuid": "ab4f2b69-4eb0-4b40-813b-21c594bf00ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22795", "type": "seen", "source": "https://t.me/cibsecurity/38729", "content": "\u203c CVE-2022-22795 \u203c\n\nSigniant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-10T20:26:22.000000Z"}</description>
      <content:encoded>{"uuid": "ab4f2b69-4eb0-4b40-813b-21c594bf00ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22795", "type": "seen", "source": "https://t.me/cibsecurity/38729", "content": "\u203c CVE-2022-22795 \u203c\n\nSigniant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-10T20:26:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ab4f2b69-4eb0-4b40-813b-21c594bf00ec/export</guid>
      <pubDate>Thu, 10 Mar 2022 20:26:22 +0000</pubDate>
    </item>
  </channel>
</rss>
