<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 20:39:20 +0000</lastBuildDate>
    <item>
      <title>d0a65197-106e-4273-8baa-23d65bd19c63</title>
      <link>https://db.gcve.eu/sighting/d0a65197-106e-4273-8baa-23d65bd19c63/export</link>
      <description>{"uuid": "d0a65197-106e-4273-8baa-23d65bd19c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32498", "type": "seen", "source": "https://t.me/cibsecurity/46737", "content": "\u203c CVE-2022-32498 \u203c\n\nDell EMC PowerStore, Versions prior to v3.0.0.0 contain a DLL Hijacking vulnerability in PSTCLI. A local attacker can potentially exploit this vulnerability to execute arbitrary code, escalate privileges, and bypass software allow list solutions, leading to system takeover or IP exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-21T07:13:02.000000Z"}</description>
      <content:encoded>{"uuid": "d0a65197-106e-4273-8baa-23d65bd19c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32498", "type": "seen", "source": "https://t.me/cibsecurity/46737", "content": "\u203c CVE-2022-32498 \u203c\n\nDell EMC PowerStore, Versions prior to v3.0.0.0 contain a DLL Hijacking vulnerability in PSTCLI. A local attacker can potentially exploit this vulnerability to execute arbitrary code, escalate privileges, and bypass software allow list solutions, leading to system takeover or IP exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-21T07:13:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d0a65197-106e-4273-8baa-23d65bd19c63/export</guid>
      <pubDate>Thu, 21 Jul 2022 07:13:02 +0000</pubDate>
    </item>
    <item>
      <title>33784973-4555-440b-be1d-44d014fb5950</title>
      <link>https://db.gcve.eu/sighting/33784973-4555-440b-be1d-44d014fb5950/export</link>
      <description>{"uuid": "33784973-4555-440b-be1d-44d014fb5950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32492", "type": "seen", "source": "https://t.me/cibsecurity/51133", "content": "\u203c CVE-2022-32492 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T20:26:08.000000Z"}</description>
      <content:encoded>{"uuid": "33784973-4555-440b-be1d-44d014fb5950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32492", "type": "seen", "source": "https://t.me/cibsecurity/51133", "content": "\u203c CVE-2022-32492 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T20:26:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/33784973-4555-440b-be1d-44d014fb5950/export</guid>
      <pubDate>Tue, 11 Oct 2022 20:26:08 +0000</pubDate>
    </item>
    <item>
      <title>2a56f3b0-7f87-44f3-95f1-725173222ec7</title>
      <link>https://db.gcve.eu/sighting/2a56f3b0-7f87-44f3-95f1-725173222ec7/export</link>
      <description>{"uuid": "2a56f3b0-7f87-44f3-95f1-725173222ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3249", "type": "seen", "source": "https://t.me/cibsecurity/54000", "content": "\u203c CVE-2022-3249 \u203c\n\nThe WP CSV Exporter WordPress plugin before 1.3.7 does not properly sanitise and escape some parameters before using them in a SQL statement, allowing high privilege users such as admin to perform SQL injection attacks\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T20:40:01.000000Z"}</description>
      <content:encoded>{"uuid": "2a56f3b0-7f87-44f3-95f1-725173222ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3249", "type": "seen", "source": "https://t.me/cibsecurity/54000", "content": "\u203c CVE-2022-3249 \u203c\n\nThe WP CSV Exporter WordPress plugin before 1.3.7 does not properly sanitise and escape some parameters before using them in a SQL statement, allowing high privilege users such as admin to perform SQL injection attacks\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T20:40:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2a56f3b0-7f87-44f3-95f1-725173222ec7/export</guid>
      <pubDate>Mon, 05 Dec 2022 20:40:01 +0000</pubDate>
    </item>
    <item>
      <title>7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0</title>
      <link>https://db.gcve.eu/sighting/7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0/export</link>
      <description>{"uuid": "7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32490", "type": "seen", "source": "https://t.me/cibsecurity/56656", "content": "\u203c CVE-2022-32490 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-18T12:20:48.000000Z"}</description>
      <content:encoded>{"uuid": "7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32490", "type": "seen", "source": "https://t.me/cibsecurity/56656", "content": "\u203c CVE-2022-32490 \u203c\n\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-18T12:20:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e8890e0-7618-4a6e-87e0-eaed1f5a4fc0/export</guid>
      <pubDate>Wed, 18 Jan 2023 12:20:48 +0000</pubDate>
    </item>
  </channel>
</rss>
