<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 18 May 2026 16:13:44 +0000</lastBuildDate>
    <item>
      <title>c3f1786c-259b-426a-bbc1-0855565b48a9</title>
      <link>https://db.gcve.eu/sighting/c3f1786c-259b-426a-bbc1-0855565b48a9/export</link>
      <description>{"uuid": "c3f1786c-259b-426a-bbc1-0855565b48a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27569", "type": "seen", "source": "https://t.me/cibsecurity/40511", "content": "\u203c CVE-2022-27569 \u203c\n\nHeap-based buffer overflow vulnerability in parser_infe function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:16:25.000000Z"}</description>
      <content:encoded>{"uuid": "c3f1786c-259b-426a-bbc1-0855565b48a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27569", "type": "seen", "source": "https://t.me/cibsecurity/40511", "content": "\u203c CVE-2022-27569 \u203c\n\nHeap-based buffer overflow vulnerability in parser_infe function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:16:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c3f1786c-259b-426a-bbc1-0855565b48a9/export</guid>
      <pubDate>Tue, 12 Apr 2022 00:16:25 +0000</pubDate>
    </item>
    <item>
      <title>19129c16-6e8e-44f0-928d-5629244cf71d</title>
      <link>https://db.gcve.eu/sighting/19129c16-6e8e-44f0-928d-5629244cf71d/export</link>
      <description>{"uuid": "19129c16-6e8e-44f0-928d-5629244cf71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27567", "type": "seen", "source": "https://t.me/cibsecurity/40540", "content": "\u203c CVE-2022-27567 \u203c\n\nNull pointer dereference vulnerability in parser_hvcC function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attackers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:22:40.000000Z"}</description>
      <content:encoded>{"uuid": "19129c16-6e8e-44f0-928d-5629244cf71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27567", "type": "seen", "source": "https://t.me/cibsecurity/40540", "content": "\u203c CVE-2022-27567 \u203c\n\nNull pointer dereference vulnerability in parser_hvcC function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attackers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:22:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/19129c16-6e8e-44f0-928d-5629244cf71d/export</guid>
      <pubDate>Tue, 12 Apr 2022 00:22:40 +0000</pubDate>
    </item>
    <item>
      <title>38f8a36b-e199-48aa-80fd-bd749a7bd914</title>
      <link>https://db.gcve.eu/sighting/38f8a36b-e199-48aa-80fd-bd749a7bd914/export</link>
      <description>{"uuid": "38f8a36b-e199-48aa-80fd-bd749a7bd914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27568", "type": "seen", "source": "https://t.me/cibsecurity/40559", "content": "\u203c CVE-2022-27568 \u203c\n\nHeap-based buffer overflow vulnerability in parser_iloc function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:30:10.000000Z"}</description>
      <content:encoded>{"uuid": "38f8a36b-e199-48aa-80fd-bd749a7bd914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27568", "type": "seen", "source": "https://t.me/cibsecurity/40559", "content": "\u203c CVE-2022-27568 \u203c\n\nHeap-based buffer overflow vulnerability in parser_iloc function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T00:30:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/38f8a36b-e199-48aa-80fd-bd749a7bd914/export</guid>
      <pubDate>Tue, 12 Apr 2022 00:30:10 +0000</pubDate>
    </item>
    <item>
      <title>1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de</title>
      <link>https://db.gcve.eu/sighting/1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de/export</link>
      <description>{"uuid": "1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2756", "type": "seen", "source": "https://t.me/cibsecurity/47874", "content": "\u203c CVE-2022-2756 \u203c\n\nServer-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T20:26:16.000000Z"}</description>
      <content:encoded>{"uuid": "1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2756", "type": "seen", "source": "https://t.me/cibsecurity/47874", "content": "\u203c CVE-2022-2756 \u203c\n\nServer-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T20:26:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1a93be4c-b4b7-42bc-b05b-dfd01ac0b6de/export</guid>
      <pubDate>Wed, 10 Aug 2022 20:26:16 +0000</pubDate>
    </item>
    <item>
      <title>e94b8685-5ea0-418f-b116-8c0370621df1</title>
      <link>https://db.gcve.eu/sighting/e94b8685-5ea0-418f-b116-8c0370621df1/export</link>
      <description>{"uuid": "e94b8685-5ea0-418f-b116-8c0370621df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27560", "type": "seen", "source": "https://t.me/cibsecurity/49085", "content": "\u203c CVE-2022-27560 \u203c\n\nHCL VersionVault Express exposes administrator credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:00.000000Z"}</description>
      <content:encoded>{"uuid": "e94b8685-5ea0-418f-b116-8c0370621df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27560", "type": "seen", "source": "https://t.me/cibsecurity/49085", "content": "\u203c CVE-2022-27560 \u203c\n\nHCL VersionVault Express exposes administrator credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e94b8685-5ea0-418f-b116-8c0370621df1/export</guid>
      <pubDate>Wed, 31 Aug 2022 02:36:00 +0000</pubDate>
    </item>
    <item>
      <title>2d082a8a-0d6e-4d99-b748-64169c738925</title>
      <link>https://db.gcve.eu/sighting/2d082a8a-0d6e-4d99-b748-64169c738925/export</link>
      <description>{"uuid": "2d082a8a-0d6e-4d99-b748-64169c738925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27563", "type": "seen", "source": "https://t.me/cibsecurity/49087", "content": "\u203c CVE-2022-27563 \u203c\n\nAn unauthenticated user can overload a part of HCL VersionVault Express and cause a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:03.000000Z"}</description>
      <content:encoded>{"uuid": "2d082a8a-0d6e-4d99-b748-64169c738925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27563", "type": "seen", "source": "https://t.me/cibsecurity/49087", "content": "\u203c CVE-2022-27563 \u203c\n\nAn unauthenticated user can overload a part of HCL VersionVault Express and cause a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-31T02:36:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2d082a8a-0d6e-4d99-b748-64169c738925/export</guid>
      <pubDate>Wed, 31 Aug 2022 02:36:03 +0000</pubDate>
    </item>
    <item>
      <title>93642331-93e6-45d7-a0e6-ae4650e8ed12</title>
      <link>https://db.gcve.eu/sighting/93642331-93e6-45d7-a0e6-ae4650e8ed12/export</link>
      <description>{"uuid": "93642331-93e6-45d7-a0e6-ae4650e8ed12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27561", "type": "seen", "source": "https://t.me/cibsecurity/49856", "content": "\u203c CVE-2022-27561 \u203c\n\nThere is a reflected Cross-Site Scripting vulnerability in the HCL Traveler web admin (LotusTraveler.nsf).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T02:27:56.000000Z"}</description>
      <content:encoded>{"uuid": "93642331-93e6-45d7-a0e6-ae4650e8ed12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27561", "type": "seen", "source": "https://t.me/cibsecurity/49856", "content": "\u203c CVE-2022-27561 \u203c\n\nThere is a reflected Cross-Site Scripting vulnerability in the HCL Traveler web admin (LotusTraveler.nsf).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T02:27:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/93642331-93e6-45d7-a0e6-ae4650e8ed12/export</guid>
      <pubDate>Fri, 16 Sep 2022 02:27:56 +0000</pubDate>
    </item>
    <item>
      <title>ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5</title>
      <link>https://db.gcve.eu/sighting/ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5/export</link>
      <description>{"uuid": "ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-27562\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications.\n\ud83d\udccf Published: 2025-04-30T20:54:20.782Z\n\ud83d\udccf Modified: 2025-04-30T20:54:20.782Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;amp;sysparm_article=KB0120722", "creation_timestamp": "2025-04-30T21:15:23.000000Z"}</description>
      <content:encoded>{"uuid": "ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-27562\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications.\n\ud83d\udccf Published: 2025-04-30T20:54:20.782Z\n\ud83d\udccf Modified: 2025-04-30T20:54:20.782Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;amp;sysparm_article=KB0120722", "creation_timestamp": "2025-04-30T21:15:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ff87f343-afb7-4f6c-9b2f-4ba80d1c29d5/export</guid>
      <pubDate>Wed, 30 Apr 2025 21:15:23 +0000</pubDate>
    </item>
    <item>
      <title>6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c</title>
      <link>https://db.gcve.eu/sighting/6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c/export</link>
      <description>{"uuid": "6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2rxhwxgh2l", "content": "", "creation_timestamp": "2025-04-30T21:55:49.800910Z"}</description>
      <content:encoded>{"uuid": "6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2rxhwxgh2l", "content": "", "creation_timestamp": "2025-04-30T21:55:49.800910Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6f8b83a5-ae7f-42fa-99c9-70066bcc3d0c/export</guid>
      <pubDate>Wed, 30 Apr 2025 21:55:49 +0000</pubDate>
    </item>
    <item>
      <title>7cfa4d12-8734-49da-b9e7-3bc2d3b5d447</title>
      <link>https://db.gcve.eu/sighting/7cfa4d12-8734-49da-b9e7-3bc2d3b5d447/export</link>
      <description>{"uuid": "7cfa4d12-8734-49da-b9e7-3bc2d3b5d447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/cvedetector/24154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27562 - HCL Domino Volt HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27562 \nPublished : April 30, 2025, 9:15 p.m. | 48\u00a0minutes ago \nDescription : Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:51.000000Z"}</description>
      <content:encoded>{"uuid": "7cfa4d12-8734-49da-b9e7-3bc2d3b5d447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27562", "type": "seen", "source": "https://t.me/cvedetector/24154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27562 - HCL Domino Volt HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27562 \nPublished : April 30, 2025, 9:15 p.m. | 48\u00a0minutes ago \nDescription : Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7cfa4d12-8734-49da-b9e7-3bc2d3b5d447/export</guid>
      <pubDate>Thu, 01 May 2025 00:36:51 +0000</pubDate>
    </item>
  </channel>
</rss>
