<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 19:10:07 +0000</lastBuildDate>
    <item>
      <title>7e7dfb31-a490-4758-9f7a-fb60e035230c</title>
      <link>https://db.gcve.eu/sighting/7e7dfb31-a490-4758-9f7a-fb60e035230c/export</link>
      <description>{"uuid": "7e7dfb31-a490-4758-9f7a-fb60e035230c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31447", "type": "seen", "source": "https://t.me/cibsecurity/44353", "content": "\u203c CVE-2022-31447 \u203c\n\nAn XML external entity (XXE) injection vulnerability in Magicpin v3.4 allows attackers to access sensitive database information via a crafted SVG file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T07:18:28.000000Z"}</description>
      <content:encoded>{"uuid": "7e7dfb31-a490-4758-9f7a-fb60e035230c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31447", "type": "seen", "source": "https://t.me/cibsecurity/44353", "content": "\u203c CVE-2022-31447 \u203c\n\nAn XML external entity (XXE) injection vulnerability in Magicpin v3.4 allows attackers to access sensitive database information via a crafted SVG file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T07:18:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e7dfb31-a490-4758-9f7a-fb60e035230c/export</guid>
      <pubDate>Tue, 14 Jun 2022 07:18:28 +0000</pubDate>
    </item>
    <item>
      <title>73495ef3-b043-47f3-b2f7-d7abb7b8c3e8</title>
      <link>https://db.gcve.eu/sighting/73495ef3-b043-47f3-b2f7-d7abb7b8c3e8/export</link>
      <description>{"uuid": "73495ef3-b043-47f3-b2f7-d7abb7b8c3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31446", "type": "seen", "source": "https://t.me/cibsecurity/44354", "content": "\u203c CVE-2022-31446 \u203c\n\nTenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T07:18:29.000000Z"}</description>
      <content:encoded>{"uuid": "73495ef3-b043-47f3-b2f7-d7abb7b8c3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31446", "type": "seen", "source": "https://t.me/cibsecurity/44354", "content": "\u203c CVE-2022-31446 \u203c\n\nTenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T07:18:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/73495ef3-b043-47f3-b2f7-d7abb7b8c3e8/export</guid>
      <pubDate>Tue, 14 Jun 2022 07:18:29 +0000</pubDate>
    </item>
    <item>
      <title>386039de-54dd-47a0-adfe-4bcf0956a2fe</title>
      <link>https://db.gcve.eu/sighting/386039de-54dd-47a0-adfe-4bcf0956a2fe/export</link>
      <description>{"uuid": "386039de-54dd-47a0-adfe-4bcf0956a2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3144", "type": "seen", "source": "https://t.me/cibsecurity/50327", "content": "\u203c CVE-2022-3144 \u203c\n\nThe Wordfence Security \u00e2\u20ac\u201c Firewall &amp;amp; Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T18:13:40.000000Z"}</description>
      <content:encoded>{"uuid": "386039de-54dd-47a0-adfe-4bcf0956a2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3144", "type": "seen", "source": "https://t.me/cibsecurity/50327", "content": "\u203c CVE-2022-3144 \u203c\n\nThe Wordfence Security \u00e2\u20ac\u201c Firewall &amp;amp; Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T18:13:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/386039de-54dd-47a0-adfe-4bcf0956a2fe/export</guid>
      <pubDate>Fri, 23 Sep 2022 18:13:40 +0000</pubDate>
    </item>
  </channel>
</rss>
