<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 14:08:51 +0000</lastBuildDate>
    <item>
      <title>f855ece5-7549-44e8-8d46-6552b12ae192</title>
      <link>https://db.gcve.eu/sighting/f855ece5-7549-44e8-8d46-6552b12ae192/export</link>
      <description>{"uuid": "f855ece5-7549-44e8-8d46-6552b12ae192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "seen", "source": "https://t.me/S_E_Reborn/4443", "content": "\ud83c\udf0d Top 10 web hacking techniques of 2023..\n\n\u2022  \u041d\u043e\u043c\u0438\u043d\u0430\u0446\u0438\u044f - top 10 \u043b\u0443\u0447\u0448\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0432\u0435\u0431-\u0432\u0437\u043b\u043e\u043c\u0430 \u0432 2023 \u0433\u043e\u0434\u0443. \u041a\u0430\u0436\u0434\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u0437\u0430\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u0435\u0442 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f:\n\n - Ransacking your password reset tokens;\n - mTLS: When certificate authentication is done wrong;\n - Smashing the state machine: the true potential of web race conditions;\n - Bypass firewalls with of-CORs and typo-squatting;\n - RCE via LDAP truncation on hg.mozilla.org;\n - Cookie Bugs - Smuggling &amp;amp; Injection;\n - OAuth 2.0 Redirect URI Validation Falls Short, Literally;\n - Prototype Pollution in Python;\n - Pretalx Vulnerabilities: How to get accepted at every conference;\n - From Akamai to F5 to NTLM... with love;\n - can I speak to your manager? hacking root EPP servers to take control of zones;\n - Blind CSS Exfiltration: exfiltrate unknown web pages;\n - Server-side prototype pollution: Black-box detection without the DoS;\n - Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari;\n - HTML Over the Wire;\n - SMTP Smuggling - Spoofing E-Mails Worldwide;\n - DOM-based race condition: racing in the browser for fun;\n - You Are Not Where You Think You Are, Opera Browsers Address Bar Spoofing Vulnerabilities;\n - CVE-2022-4908: SOP bypass in Chrome using Navigation API;\n - SSO Gadgets: Escalate (Self-)XSS to ATO;\n - Three New Attacks Against JSON Web Tokens;\n - Introducing wrapwrap: using PHP filters to wrap a file with a prefix and suffix;\n - PHP filter chains: file read from error-based oracle;\n - SSRF Cross Protocol Redirect Bypass;\n - A New Vector For \u201cDirty\u201d Arbitrary File Write to RCE;\n - How I Hacked Microsoft Teams and got $150,000 in Pwn2Own;\n - AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice;\n - BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover;\n - MyBB Admin Panel RCE CVE-2023-41362;\n - Source Code at Risk: Critical Code Vulnerability in CI/CD Platform TeamCity;\n - Code Vulnerabilities Put Skiff Emails at Riskr;\n - How to break SAML if I have paws?\n - JMX Exploitation Revisited;\n - Java Exploitation Restrictions in Modern JDK Times;\n - Exploiting Hardened .NET Deserialization;\n - Unserializable, but unreachable: Remote code execution on vBulletin;\n - Cookieless DuoDrop: IIS Auth Bypass &amp;amp; App Pool Privesc in ASP.NET Framework;\n - Hunting for Nginx Alias Traversals in the wild;\n - DNS Analyzer - Finding DNS vulnerabilities with Burp Suite;\n - Oh-Auth - Abusing OAuth to take over millions of accounts;\n - nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover;\n - One Scheme to Rule Them All: OAuth Account Takeover;\n - Exploiting HTTP Parsers Inconsistencies;\n - New ways of breaking app-integrated LLMs;\n - State of DNS Rebinding in 2023;\n - Fileless Remote Code Execution on Juniper Firewalls;\n - Thirteen Years On: Advancing the Understanding of IIS Short File Name (SFN) Disclosure!\n - Metamask Snaps: Playing in the Sand;\n - Uncovering a crazy privilege escalation from Chrome extensions;\n - Code Vulnerabilities Put Proton Mails at Risk;\n - Hacking into gRPC-Web;\n - Yelp ATO via XSS + Cookie Bridge;\n - HTTP Request Splitting vulnerabilities exploitation;\n - XSS in GMAIL Dynamic Email;\n - Azure B2C Crypto Misuse and Account Compromise;\n - Compromising F5 BIGIP with Request Smuggling;\n - One Supply Chain Attack to Rule Them All;\n - Cookie Crumbles: Breaking and Fixing Web Session Integrity;\n - tRPC Security Research: Hunting for Vulnerabilities in Modern APIs;\n - From an Innocent Client-Side Path Traversal to Account Takeover.\n\n#web #hack", "creation_timestamp": "2024-01-25T19:25:42.000000Z"}</description>
      <content:encoded>{"uuid": "f855ece5-7549-44e8-8d46-6552b12ae192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "seen", "source": "https://t.me/S_E_Reborn/4443", "content": "\ud83c\udf0d Top 10 web hacking techniques of 2023..\n\n\u2022  \u041d\u043e\u043c\u0438\u043d\u0430\u0446\u0438\u044f - top 10 \u043b\u0443\u0447\u0448\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0432\u0435\u0431-\u0432\u0437\u043b\u043e\u043c\u0430 \u0432 2023 \u0433\u043e\u0434\u0443. \u041a\u0430\u0436\u0434\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u0437\u0430\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u0435\u0442 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f:\n\n - Ransacking your password reset tokens;\n - mTLS: When certificate authentication is done wrong;\n - Smashing the state machine: the true potential of web race conditions;\n - Bypass firewalls with of-CORs and typo-squatting;\n - RCE via LDAP truncation on hg.mozilla.org;\n - Cookie Bugs - Smuggling &amp;amp; Injection;\n - OAuth 2.0 Redirect URI Validation Falls Short, Literally;\n - Prototype Pollution in Python;\n - Pretalx Vulnerabilities: How to get accepted at every conference;\n - From Akamai to F5 to NTLM... with love;\n - can I speak to your manager? hacking root EPP servers to take control of zones;\n - Blind CSS Exfiltration: exfiltrate unknown web pages;\n - Server-side prototype pollution: Black-box detection without the DoS;\n - Tricks for Reliable Split-Second DNS Rebinding in Chrome and Safari;\n - HTML Over the Wire;\n - SMTP Smuggling - Spoofing E-Mails Worldwide;\n - DOM-based race condition: racing in the browser for fun;\n - You Are Not Where You Think You Are, Opera Browsers Address Bar Spoofing Vulnerabilities;\n - CVE-2022-4908: SOP bypass in Chrome using Navigation API;\n - SSO Gadgets: Escalate (Self-)XSS to ATO;\n - Three New Attacks Against JSON Web Tokens;\n - Introducing wrapwrap: using PHP filters to wrap a file with a prefix and suffix;\n - PHP filter chains: file read from error-based oracle;\n - SSRF Cross Protocol Redirect Bypass;\n - A New Vector For \u201cDirty\u201d Arbitrary File Write to RCE;\n - How I Hacked Microsoft Teams and got $150,000 in Pwn2Own;\n - AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice;\n - BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover;\n - MyBB Admin Panel RCE CVE-2023-41362;\n - Source Code at Risk: Critical Code Vulnerability in CI/CD Platform TeamCity;\n - Code Vulnerabilities Put Skiff Emails at Riskr;\n - How to break SAML if I have paws?\n - JMX Exploitation Revisited;\n - Java Exploitation Restrictions in Modern JDK Times;\n - Exploiting Hardened .NET Deserialization;\n - Unserializable, but unreachable: Remote code execution on vBulletin;\n - Cookieless DuoDrop: IIS Auth Bypass &amp;amp; App Pool Privesc in ASP.NET Framework;\n - Hunting for Nginx Alias Traversals in the wild;\n - DNS Analyzer - Finding DNS vulnerabilities with Burp Suite;\n - Oh-Auth - Abusing OAuth to take over millions of accounts;\n - nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover;\n - One Scheme to Rule Them All: OAuth Account Takeover;\n - Exploiting HTTP Parsers Inconsistencies;\n - New ways of breaking app-integrated LLMs;\n - State of DNS Rebinding in 2023;\n - Fileless Remote Code Execution on Juniper Firewalls;\n - Thirteen Years On: Advancing the Understanding of IIS Short File Name (SFN) Disclosure!\n - Metamask Snaps: Playing in the Sand;\n - Uncovering a crazy privilege escalation from Chrome extensions;\n - Code Vulnerabilities Put Proton Mails at Risk;\n - Hacking into gRPC-Web;\n - Yelp ATO via XSS + Cookie Bridge;\n - HTTP Request Splitting vulnerabilities exploitation;\n - XSS in GMAIL Dynamic Email;\n - Azure B2C Crypto Misuse and Account Compromise;\n - Compromising F5 BIGIP with Request Smuggling;\n - One Supply Chain Attack to Rule Them All;\n - Cookie Crumbles: Breaking and Fixing Web Session Integrity;\n - tRPC Security Research: Hunting for Vulnerabilities in Modern APIs;\n - From an Innocent Client-Side Path Traversal to Account Takeover.\n\n#web #hack", "creation_timestamp": "2024-01-25T19:25:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f855ece5-7549-44e8-8d46-6552b12ae192/export</guid>
      <pubDate>Thu, 25 Jan 2024 19:25:42 +0000</pubDate>
    </item>
    <item>
      <title>04e375de-52e8-42e9-b6fd-f007f5a45360</title>
      <link>https://db.gcve.eu/sighting/04e375de-52e8-42e9-b6fd-f007f5a45360/export</link>
      <description>{"uuid": "04e375de-52e8-42e9-b6fd-f007f5a45360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7884", "content": "CVE-2022-4908: SOP bypass in Chrome using Navigation API - Johan Carlsson\n\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api/", "creation_timestamp": "2024-07-27T20:09:08.000000Z"}</description>
      <content:encoded>{"uuid": "04e375de-52e8-42e9-b6fd-f007f5a45360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7884", "content": "CVE-2022-4908: SOP bypass in Chrome using Navigation API - Johan Carlsson\n\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api/", "creation_timestamp": "2024-07-27T20:09:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/04e375de-52e8-42e9-b6fd-f007f5a45360/export</guid>
      <pubDate>Sat, 27 Jul 2024 20:09:08 +0000</pubDate>
    </item>
    <item>
      <title>e6d5acc1-178f-43dd-80ee-df0a10413a29</title>
      <link>https://db.gcve.eu/sighting/e6d5acc1-178f-43dd-80ee-df0a10413a29/export</link>
      <description>{"uuid": "e6d5acc1-178f-43dd-80ee-df0a10413a29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1327", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2024-08-16T08:32:36.000000Z"}</description>
      <content:encoded>{"uuid": "e6d5acc1-178f-43dd-80ee-df0a10413a29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1327", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2024-08-16T08:32:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e6d5acc1-178f-43dd-80ee-df0a10413a29/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:32:36 +0000</pubDate>
    </item>
    <item>
      <title>781d3574-4380-44eb-8dcb-06f6bce84b1a</title>
      <link>https://db.gcve.eu/sighting/781d3574-4380-44eb-8dcb-06f6bce84b1a/export</link>
      <description>{"uuid": "781d3574-4380-44eb-8dcb-06f6bce84b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9175", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2025-01-24T11:06:04.000000Z"}</description>
      <content:encoded>{"uuid": "781d3574-4380-44eb-8dcb-06f6bce84b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4908", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9175", "content": "#exploit\n1. CVE-2023-43641:\n1-Click RCE on GNOME (libcue)\nhttps://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\n\n2. CVE-2022-4908:\nSOP bypass in Chrome using Navigation API\nhttps://joaxcar.com/blog/2023/10/06/cve-2022-4908-sop-bypass-in-chrome-using-navigation-api\n\n3. CVE-2023-2640, CVE-2023-32629:\n\"GameOver(lay)\" Ubuntu Privilege Escalation\nhttps://github.com/g1vi/CVE-2023-2640-CVE-2023-32629", "creation_timestamp": "2025-01-24T11:06:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/781d3574-4380-44eb-8dcb-06f6bce84b1a/export</guid>
      <pubDate>Fri, 24 Jan 2025 11:06:04 +0000</pubDate>
    </item>
    <item>
      <title>4ed81eda-94ab-4b8c-bb1a-44e1c2ebd6ad</title>
      <link>https://db.gcve.eu/sighting/4ed81eda-94ab-4b8c-bb1a-44e1c2ebd6ad/export</link>
      <description>{"uuid": "4ed81eda-94ab-4b8c-bb1a-44e1c2ebd6ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49085", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5748", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49085\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: Fix five use after free bugs in get_initial_state\n\nIn get_initial_state, it calls notify_initial_state_done(skb,..) if\ncb-&amp;gt;args[5]==1. If genlmsg_put() failed in notify_initial_state_done(),\nthe skb will be freed by nlmsg_free(skb).\nThen get_initial_state will goto out and the freed skb will be used by\nreturn value skb-&amp;gt;len, which is a uaf bug.\n\nWhat's worse, the same problem goes even further: skb can also be\nfreed in the notify_*_state_change -&amp;gt; notify_*_state calls below.\nThus 4 additional uaf bugs happened.\n\nMy patch lets the problem callee functions: notify_initial_state_done\nand notify_*_state_change return an error code if errors happen.\nSo that the error codes could be propagated and the uaf bugs can be avoid.\n\nv2 reports a compilation warning. This v3 fixed this warning and built\nsuccessfully in my local environment with no additional warnings.\nv2: https://lore.kernel.org/patchwork/patch/1435218/\n\ud83d\udccf Published: 2025-02-26T01:54:43.579Z\n\ud83d\udccf Modified: 2025-02-27T18:02:29.848Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/0489700bfeb1e53eb2039c2291c67e71b0b40103\n2. https://git.kernel.org/stable/c/dcf6be17b5c53b741898d2223b23e66d682de300\n3. https://git.kernel.org/stable/c/188fe6b26765edbad4055611c0f788b6870f4024\n4. https://git.kernel.org/stable/c/b6a4055036eed1f5e239ce3d8b0db1ce38bba447\n5. https://git.kernel.org/stable/c/594205b4936771a250f9d141e7e0fff21c3dd2d9\n6. https://git.kernel.org/stable/c/a972c768723359ec995579902473028fe3cd64b1\n7. https://git.kernel.org/stable/c/de63e74da2333b4068bb79983e632db730fea97e\n8. https://git.kernel.org/stable/c/226e993c39405292781bfcf4b039a8db56aab362\n9. https://git.kernel.org/stable/c/aadb22ba2f656581b2f733deb3a467c48cc618f6", "creation_timestamp": "2025-02-27T18:27:11.000000Z"}</description>
      <content:encoded>{"uuid": "4ed81eda-94ab-4b8c-bb1a-44e1c2ebd6ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49085", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5748", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49085\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: Fix five use after free bugs in get_initial_state\n\nIn get_initial_state, it calls notify_initial_state_done(skb,..) if\ncb-&amp;gt;args[5]==1. If genlmsg_put() failed in notify_initial_state_done(),\nthe skb will be freed by nlmsg_free(skb).\nThen get_initial_state will goto out and the freed skb will be used by\nreturn value skb-&amp;gt;len, which is a uaf bug.\n\nWhat's worse, the same problem goes even further: skb can also be\nfreed in the notify_*_state_change -&amp;gt; notify_*_state calls below.\nThus 4 additional uaf bugs happened.\n\nMy patch lets the problem callee functions: notify_initial_state_done\nand notify_*_state_change return an error code if errors happen.\nSo that the error codes could be propagated and the uaf bugs can be avoid.\n\nv2 reports a compilation warning. This v3 fixed this warning and built\nsuccessfully in my local environment with no additional warnings.\nv2: https://lore.kernel.org/patchwork/patch/1435218/\n\ud83d\udccf Published: 2025-02-26T01:54:43.579Z\n\ud83d\udccf Modified: 2025-02-27T18:02:29.848Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/0489700bfeb1e53eb2039c2291c67e71b0b40103\n2. https://git.kernel.org/stable/c/dcf6be17b5c53b741898d2223b23e66d682de300\n3. https://git.kernel.org/stable/c/188fe6b26765edbad4055611c0f788b6870f4024\n4. https://git.kernel.org/stable/c/b6a4055036eed1f5e239ce3d8b0db1ce38bba447\n5. https://git.kernel.org/stable/c/594205b4936771a250f9d141e7e0fff21c3dd2d9\n6. https://git.kernel.org/stable/c/a972c768723359ec995579902473028fe3cd64b1\n7. https://git.kernel.org/stable/c/de63e74da2333b4068bb79983e632db730fea97e\n8. https://git.kernel.org/stable/c/226e993c39405292781bfcf4b039a8db56aab362\n9. https://git.kernel.org/stable/c/aadb22ba2f656581b2f733deb3a467c48cc618f6", "creation_timestamp": "2025-02-27T18:27:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4ed81eda-94ab-4b8c-bb1a-44e1c2ebd6ad/export</guid>
      <pubDate>Thu, 27 Feb 2025 18:27:11 +0000</pubDate>
    </item>
    <item>
      <title>cc1708d0-9f06-4c4c-9881-21e8ee4b481a</title>
      <link>https://db.gcve.eu/sighting/cc1708d0-9f06-4c4c-9881-21e8ee4b481a/export</link>
      <description>{"uuid": "cc1708d0-9f06-4c4c-9881-21e8ee4b481a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrb63dthg22e", "content": "", "creation_timestamp": "2025-06-10T15:04:20.525097Z"}</description>
      <content:encoded>{"uuid": "cc1708d0-9f06-4c4c-9881-21e8ee4b481a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrb63dthg22e", "content": "", "creation_timestamp": "2025-06-10T15:04:20.525097Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc1708d0-9f06-4c4c-9881-21e8ee4b481a/export</guid>
      <pubDate>Tue, 10 Jun 2025 15:04:20 +0000</pubDate>
    </item>
    <item>
      <title>b51fccda-9ca5-4842-90ec-e6f569498b94</title>
      <link>https://db.gcve.eu/sighting/b51fccda-9ca5-4842-90ec-e6f569498b94/export</link>
      <description>{"uuid": "b51fccda-9ca5-4842-90ec-e6f569498b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrdqgcmsrk2d", "content": "", "creation_timestamp": "2025-06-11T15:37:53.739123Z"}</description>
      <content:encoded>{"uuid": "b51fccda-9ca5-4842-90ec-e6f569498b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrdqgcmsrk2d", "content": "", "creation_timestamp": "2025-06-11T15:37:53.739123Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b51fccda-9ca5-4842-90ec-e6f569498b94/export</guid>
      <pubDate>Wed, 11 Jun 2025 15:37:53 +0000</pubDate>
    </item>
    <item>
      <title>3b88c817-7c4a-4d0b-b476-e5e6935c6fb2</title>
      <link>https://db.gcve.eu/sighting/3b88c817-7c4a-4d0b-b476-e5e6935c6fb2/export</link>
      <description>{"uuid": "3b88c817-7c4a-4d0b-b476-e5e6935c6fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrjbacjvqs26", "content": "", "creation_timestamp": "2025-06-13T20:22:06.018399Z"}</description>
      <content:encoded>{"uuid": "3b88c817-7c4a-4d0b-b476-e5e6935c6fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrjbacjvqs26", "content": "", "creation_timestamp": "2025-06-13T20:22:06.018399Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b88c817-7c4a-4d0b-b476-e5e6935c6fb2/export</guid>
      <pubDate>Fri, 13 Jun 2025 20:22:06 +0000</pubDate>
    </item>
    <item>
      <title>e3ba8e4c-b8a0-44df-b2ea-7fe64e7a8461</title>
      <link>https://db.gcve.eu/sighting/e3ba8e4c-b8a0-44df-b2ea-7fe64e7a8461/export</link>
      <description>{"uuid": "e3ba8e4c-b8a0-44df-b2ea-7fe64e7a8461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrjcvddqys26", "content": "", "creation_timestamp": "2025-06-13T20:51:45.887164Z"}</description>
      <content:encoded>{"uuid": "e3ba8e4c-b8a0-44df-b2ea-7fe64e7a8461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrjcvddqys26", "content": "", "creation_timestamp": "2025-06-13T20:51:45.887164Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e3ba8e4c-b8a0-44df-b2ea-7fe64e7a8461/export</guid>
      <pubDate>Fri, 13 Jun 2025 20:51:45 +0000</pubDate>
    </item>
    <item>
      <title>1a25f5bf-445e-4780-83af-88fe263442c0</title>
      <link>https://db.gcve.eu/sighting/1a25f5bf-445e-4780-83af-88fe263442c0/export</link>
      <description>{"uuid": "1a25f5bf-445e-4780-83af-88fe263442c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrqdlbneos2p", "content": "", "creation_timestamp": "2025-06-16T15:52:38.254848Z"}</description>
      <content:encoded>{"uuid": "1a25f5bf-445e-4780-83af-88fe263442c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49080", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lrqdlbneos2p", "content": "", "creation_timestamp": "2025-06-16T15:52:38.254848Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1a25f5bf-445e-4780-83af-88fe263442c0/export</guid>
      <pubDate>Mon, 16 Jun 2025 15:52:38 +0000</pubDate>
    </item>
  </channel>
</rss>
