<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 18:16:40 +0000</lastBuildDate>
    <item>
      <title>43a7ff6c-1ba9-44e7-b2fb-5a98cdb20081</title>
      <link>https://db.gcve.eu/sighting/43a7ff6c-1ba9-44e7-b2fb-5a98cdb20081/export</link>
      <description>{"uuid": "43a7ff6c-1ba9-44e7-b2fb-5a98cdb20081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23615", "type": "seen", "source": "https://t.me/cibsecurity/37128", "content": "\u203c CVE-2022-23615 \u203c\n\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T00:13:19.000000Z"}</description>
      <content:encoded>{"uuid": "43a7ff6c-1ba9-44e7-b2fb-5a98cdb20081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23615", "type": "seen", "source": "https://t.me/cibsecurity/37128", "content": "\u203c CVE-2022-23615 \u203c\n\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T00:13:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/43a7ff6c-1ba9-44e7-b2fb-5a98cdb20081/export</guid>
      <pubDate>Thu, 10 Feb 2022 00:13:19 +0000</pubDate>
    </item>
  </channel>
</rss>
