<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 11:58:27 +0000</lastBuildDate>
    <item>
      <title>9aaf706c-97ff-456c-a43d-7e19b80c60fe</title>
      <link>https://db.gcve.eu/sighting/9aaf706c-97ff-456c-a43d-7e19b80c60fe/export</link>
      <description>{"uuid": "9aaf706c-97ff-456c-a43d-7e19b80c60fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4684", "type": "seen", "source": "https://t.me/cibsecurity/55233", "content": "\u203c CVE-2022-4684 \u203c\n\nImproper Access Control in GitHub repository usememos/memos prior to 0.9.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-23T14:14:27.000000Z"}</description>
      <content:encoded>{"uuid": "9aaf706c-97ff-456c-a43d-7e19b80c60fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4684", "type": "seen", "source": "https://t.me/cibsecurity/55233", "content": "\u203c CVE-2022-4684 \u203c\n\nImproper Access Control in GitHub repository usememos/memos prior to 0.9.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-23T14:14:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9aaf706c-97ff-456c-a43d-7e19b80c60fe/export</guid>
      <pubDate>Fri, 23 Dec 2022 14:14:27 +0000</pubDate>
    </item>
    <item>
      <title>5267b663-9cbf-4306-8ad4-f11d5f014b32</title>
      <link>https://db.gcve.eu/sighting/5267b663-9cbf-4306-8ad4-f11d5f014b32/export</link>
      <description>{"uuid": "5267b663-9cbf-4306-8ad4-f11d5f014b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46842", "type": "seen", "source": "https://t.me/cibsecurity/57421", "content": "\u203c CVE-2022-46842 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in JS Help Desk plugin &amp;lt;= 2.7.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-03T00:15:13.000000Z"}</description>
      <content:encoded>{"uuid": "5267b663-9cbf-4306-8ad4-f11d5f014b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46842", "type": "seen", "source": "https://t.me/cibsecurity/57421", "content": "\u203c CVE-2022-46842 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in JS Help Desk plugin &amp;lt;= 2.7.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-03T00:15:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5267b663-9cbf-4306-8ad4-f11d5f014b32/export</guid>
      <pubDate>Fri, 03 Feb 2023 00:15:13 +0000</pubDate>
    </item>
    <item>
      <title>23b78cc8-078b-4fa0-afd8-c0292131e73a</title>
      <link>https://db.gcve.eu/sighting/23b78cc8-078b-4fa0-afd8-c0292131e73a/export</link>
      <description>{"uuid": "23b78cc8-078b-4fa0-afd8-c0292131e73a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46848", "type": "seen", "source": "https://t.me/cibsecurity/60880", "content": "\u203c CVE-2022-46848 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Themeisle Visualizer: Tables and Charts Manager for WordPress plugin &amp;lt;= 3.9.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T12:39:04.000000Z"}</description>
      <content:encoded>{"uuid": "23b78cc8-078b-4fa0-afd8-c0292131e73a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46848", "type": "seen", "source": "https://t.me/cibsecurity/60880", "content": "\u203c CVE-2022-46848 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Themeisle Visualizer: Tables and Charts Manager for WordPress plugin &amp;lt;= 3.9.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T12:39:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/23b78cc8-078b-4fa0-afd8-c0292131e73a/export</guid>
      <pubDate>Tue, 28 Mar 2023 12:39:04 +0000</pubDate>
    </item>
    <item>
      <title>b9c7bcbf-10ba-4138-bdbc-bfb9f7db7432</title>
      <link>https://db.gcve.eu/sighting/b9c7bcbf-10ba-4138-bdbc-bfb9f7db7432/export</link>
      <description>{"uuid": "b9c7bcbf-10ba-4138-bdbc-bfb9f7db7432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46844", "type": "seen", "source": "https://t.me/cibsecurity/63608", "content": "\u203c CVE-2022-46844 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in PixelGrade PixFields plugin &amp;lt;=\u00c2\u00a00.7.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:50.000000Z"}</description>
      <content:encoded>{"uuid": "b9c7bcbf-10ba-4138-bdbc-bfb9f7db7432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46844", "type": "seen", "source": "https://t.me/cibsecurity/63608", "content": "\u203c CVE-2022-46844 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in PixelGrade PixFields plugin &amp;lt;=\u00c2\u00a00.7.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b9c7bcbf-10ba-4138-bdbc-bfb9f7db7432/export</guid>
      <pubDate>Tue, 09 May 2023 16:38:50 +0000</pubDate>
    </item>
    <item>
      <title>d1e5dbde-d53b-4cd2-a771-8c3b5544fec5</title>
      <link>https://db.gcve.eu/sighting/d1e5dbde-d53b-4cd2-a771-8c3b5544fec5/export</link>
      <description>{"uuid": "d1e5dbde-d53b-4cd2-a771-8c3b5544fec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46849", "type": "seen", "source": "https://t.me/cibsecurity/73590", "content": "\u203c CVE-2022-46849 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar Coming Soon Page \u00e2\u20ac\u201c Responsive Coming Soon &amp;amp; Maintenance Mode allows SQL Injection.This issue affects Coming Soon Page \u00e2\u20ac\u201c Responsive Coming Soon &amp;amp; Maintenance Mode: from n/a through 1.5.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:58.000000Z"}</description>
      <content:encoded>{"uuid": "d1e5dbde-d53b-4cd2-a771-8c3b5544fec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46849", "type": "seen", "source": "https://t.me/cibsecurity/73590", "content": "\u203c CVE-2022-46849 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar Coming Soon Page \u00e2\u20ac\u201c Responsive Coming Soon &amp;amp; Maintenance Mode allows SQL Injection.This issue affects Coming Soon Page \u00e2\u20ac\u201c Responsive Coming Soon &amp;amp; Maintenance Mode: from n/a through 1.5.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d1e5dbde-d53b-4cd2-a771-8c3b5544fec5/export</guid>
      <pubDate>Mon, 06 Nov 2023 12:25:58 +0000</pubDate>
    </item>
    <item>
      <title>3c8bc007-f3ae-4a6e-8ba7-62a30a2039dc</title>
      <link>https://db.gcve.eu/sighting/3c8bc007-f3ae-4a6e-8ba7-62a30a2039dc/export</link>
      <description>{"uuid": "3c8bc007-f3ae-4a6e-8ba7-62a30a2039dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46840", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646164746250083", "content": "", "creation_timestamp": "2024-12-13T15:14:16.096325Z"}</description>
      <content:encoded>{"uuid": "3c8bc007-f3ae-4a6e-8ba7-62a30a2039dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46840", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646164746250083", "content": "", "creation_timestamp": "2024-12-13T15:14:16.096325Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3c8bc007-f3ae-4a6e-8ba7-62a30a2039dc/export</guid>
      <pubDate>Fri, 13 Dec 2024 15:14:16 +0000</pubDate>
    </item>
    <item>
      <title>a89be68d-e557-414d-804d-fb317a596d40</title>
      <link>https://db.gcve.eu/sighting/a89be68d-e557-414d-804d-fb317a596d40/export</link>
      <description>{"uuid": "a89be68d-e557-414d-804d-fb317a596d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646164761595591", "content": "", "creation_timestamp": "2024-12-13T15:14:16.382984Z"}</description>
      <content:encoded>{"uuid": "a89be68d-e557-414d-804d-fb317a596d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646164761595591", "content": "", "creation_timestamp": "2024-12-13T15:14:16.382984Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a89be68d-e557-414d-804d-fb317a596d40/export</guid>
      <pubDate>Fri, 13 Dec 2024 15:14:16 +0000</pubDate>
    </item>
    <item>
      <title>c2be1a39-5879-4eaf-8c74-bc52b9be6cc9</title>
      <link>https://db.gcve.eu/sighting/c2be1a39-5879-4eaf-8c74-bc52b9be6cc9/export</link>
      <description>{"uuid": "c2be1a39-5879-4eaf-8c74-bc52b9be6cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4684\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.\n\ud83d\udccf Published: 2022-12-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-09T20:33:22.316Z\n\ud83d\udd17 References:\n1. https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9\n2. https://huntr.dev/bounties/b66f2bdd-8b41-456c-bf65-92302c2e03b5", "creation_timestamp": "2025-04-09T20:48:42.000000Z"}</description>
      <content:encoded>{"uuid": "c2be1a39-5879-4eaf-8c74-bc52b9be6cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4684\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.\n\ud83d\udccf Published: 2022-12-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-09T20:33:22.316Z\n\ud83d\udd17 References:\n1. https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9\n2. https://huntr.dev/bounties/b66f2bdd-8b41-456c-bf65-92302c2e03b5", "creation_timestamp": "2025-04-09T20:48:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c2be1a39-5879-4eaf-8c74-bc52b9be6cc9/export</guid>
      <pubDate>Wed, 09 Apr 2025 20:48:42 +0000</pubDate>
    </item>
    <item>
      <title>1edb0548-a5d4-493d-80ca-ee64d07fa805</title>
      <link>https://db.gcve.eu/sighting/1edb0548-a5d4-493d-80ca-ee64d07fa805/export</link>
      <description>{"uuid": "1edb0548-a5d4-493d-80ca-ee64d07fa805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46845", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ed3ce24221b36a222c458779355599db", "content": "", "creation_timestamp": "2025-12-09T19:13:06.000000Z"}</description>
      <content:encoded>{"uuid": "1edb0548-a5d4-493d-80ca-ee64d07fa805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-46845", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ed3ce24221b36a222c458779355599db", "content": "", "creation_timestamp": "2025-12-09T19:13:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1edb0548-a5d4-493d-80ca-ee64d07fa805/export</guid>
      <pubDate>Tue, 09 Dec 2025 19:13:06 +0000</pubDate>
    </item>
  </channel>
</rss>
