<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:02:10 +0000</lastBuildDate>
    <item>
      <title>a26b87aa-8bf3-4736-ade8-6b9951f02da4</title>
      <link>https://db.gcve.eu/sighting/a26b87aa-8bf3-4736-ade8-6b9951f02da4/export</link>
      <description>{"uuid": "a26b87aa-8bf3-4736-ade8-6b9951f02da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35490", "type": "seen", "source": "https://t.me/cibsecurity/47732", "content": "\u203c CVE-2022-35490 \u203c\n\nZammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:23:43.000000Z"}</description>
      <content:encoded>{"uuid": "a26b87aa-8bf3-4736-ade8-6b9951f02da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35490", "type": "seen", "source": "https://t.me/cibsecurity/47732", "content": "\u203c CVE-2022-35490 \u203c\n\nZammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:23:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a26b87aa-8bf3-4736-ade8-6b9951f02da4/export</guid>
      <pubDate>Mon, 08 Aug 2022 18:23:43 +0000</pubDate>
    </item>
    <item>
      <title>edd50f79-6792-4c31-8058-c3d8667803cf</title>
      <link>https://db.gcve.eu/sighting/edd50f79-6792-4c31-8058-c3d8667803cf/export</link>
      <description>{"uuid": "edd50f79-6792-4c31-8058-c3d8667803cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35493", "type": "seen", "source": "https://t.me/cibsecurity/47746", "content": "\u203c CVE-2022-35493 \u203c\n\nA Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:24:02.000000Z"}</description>
      <content:encoded>{"uuid": "edd50f79-6792-4c31-8058-c3d8667803cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35493", "type": "seen", "source": "https://t.me/cibsecurity/47746", "content": "\u203c CVE-2022-35493 \u203c\n\nA Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:24:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/edd50f79-6792-4c31-8058-c3d8667803cf/export</guid>
      <pubDate>Mon, 08 Aug 2022 18:24:02 +0000</pubDate>
    </item>
    <item>
      <title>112a46cc-a8d8-4cb5-9154-c27262b71a87</title>
      <link>https://db.gcve.eu/sighting/112a46cc-a8d8-4cb5-9154-c27262b71a87/export</link>
      <description>{"uuid": "112a46cc-a8d8-4cb5-9154-c27262b71a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3549", "type": "seen", "source": "https://t.me/cibsecurity/51573", "content": "\u203c CVE-2022-3549 \u203c\n\nA vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /csms/admin/?page=user/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T16:13:22.000000Z"}</description>
      <content:encoded>{"uuid": "112a46cc-a8d8-4cb5-9154-c27262b71a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3549", "type": "seen", "source": "https://t.me/cibsecurity/51573", "content": "\u203c CVE-2022-3549 \u203c\n\nA vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /csms/admin/?page=user/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T16:13:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/112a46cc-a8d8-4cb5-9154-c27262b71a87/export</guid>
      <pubDate>Mon, 17 Oct 2022 16:13:22 +0000</pubDate>
    </item>
  </channel>
</rss>
