<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T15:39:41.813516+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c01bbb54-5b32-4f47-8322-d817e6764056/export</id>
    <title>c01bbb54-5b32-4f47-8322-d817e6764056</title>
    <updated>2026-05-06T15:39:42.285474+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c01bbb54-5b32-4f47-8322-d817e6764056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32414", "type": "seen", "source": "https://t.me/cibsecurity/44878", "content": "\u203c CVE-2022-32414 \u203c\n\nNginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-21T16:27:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c01bbb54-5b32-4f47-8322-d817e6764056/export"/>
    <published>2022-06-21T16:27:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/617d531d-41c0-4bd1-9559-7638936ae670/export</id>
    <title>617d531d-41c0-4bd1-9559-7638936ae670</title>
    <updated>2026-05-06T15:39:42.285387+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "617d531d-41c0-4bd1-9559-7638936ae670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32413", "type": "seen", "source": "https://t.me/cibsecurity/45622", "content": "\u203c CVE-2022-32413 \u203c\n\nAn arbitrary file upload vulnerability in Dice v4.2.0 allows attackers to execute arbitrary code via a crafted file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T00:13:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/617d531d-41c0-4bd1-9559-7638936ae670/export"/>
    <published>2022-07-06T00:13:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c333ca08-a9d6-4573-830b-3fc2bf5d85a7/export</id>
    <title>c333ca08-a9d6-4573-830b-3fc2bf5d85a7</title>
    <updated>2026-05-06T15:39:42.285310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c333ca08-a9d6-4573-830b-3fc2bf5d85a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32415", "type": "seen", "source": "https://t.me/cibsecurity/46281", "content": "\u203c CVE-2022-32415 \u203c\n\nProduct Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/?p=products/view_product&amp;amp;id=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T02:33:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c333ca08-a9d6-4573-830b-3fc2bf5d85a7/export"/>
    <published>2022-07-15T02:33:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/caca4780-60de-4702-9df3-b8e3e3f1e65d/export</id>
    <title>caca4780-60de-4702-9df3-b8e3e3f1e65d</title>
    <updated>2026-05-06T15:39:42.285230+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "caca4780-60de-4702-9df3-b8e3e3f1e65d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32417", "type": "seen", "source": "https://t.me/cibsecurity/46284", "content": "\u203c CVE-2022-32417 \u203c\n\nPbootCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the function parserIfLabel at function.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T02:33:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/caca4780-60de-4702-9df3-b8e3e3f1e65d/export"/>
    <published>2022-07-15T02:33:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/435d003d-59bb-4d69-936a-d83c2e6aba0f/export</id>
    <title>435d003d-59bb-4d69-936a-d83c2e6aba0f</title>
    <updated>2026-05-06T15:39:42.285122+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "435d003d-59bb-4d69-936a-d83c2e6aba0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32416", "type": "seen", "source": "https://t.me/cibsecurity/46286", "content": "\u203c CVE-2022-32416 \u203c\n\nProduct Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/classes/Master.php?f=delete_product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T02:33:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/435d003d-59bb-4d69-936a-d83c2e6aba0f/export"/>
    <published>2022-07-15T02:33:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cba51af9-4b51-4e1a-9525-43b77cfc8163/export</id>
    <title>cba51af9-4b51-4e1a-9525-43b77cfc8163</title>
    <updated>2026-05-06T15:39:42.283450+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cba51af9-4b51-4e1a-9525-43b77cfc8163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3241", "type": "seen", "source": "https://t.me/cibsecurity/55754", "content": "\u203c CVE-2022-3241 \u203c\n\nThe Build App Online WordPress plugin before 1.0.19 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T11:55:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cba51af9-4b51-4e1a-9525-43b77cfc8163/export"/>
    <published>2023-01-04T11:55:20+00:00</published>
  </entry>
</feed>
