<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 11:50:51 +0000</lastBuildDate>
    <item>
      <title>95d01a0e-e321-4d4d-8bb2-f6a50e78c864</title>
      <link>https://vulnerability.circl.lu/sighting/95d01a0e-e321-4d4d-8bb2-f6a50e78c864/export</link>
      <description>{"uuid": "95d01a0e-e321-4d4d-8bb2-f6a50e78c864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24464", "type": "seen", "source": "https://t.me/cibsecurity/38577", "content": "\u203c CVE-2022-24464 \u203c\n\n.NET and Visual Studio Denial of Service Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:11:56.000000Z"}</description>
      <content:encoded>{"uuid": "95d01a0e-e321-4d4d-8bb2-f6a50e78c864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24464", "type": "seen", "source": "https://t.me/cibsecurity/38577", "content": "\u203c CVE-2022-24464 \u203c\n\n.NET and Visual Studio Denial of Service Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:11:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95d01a0e-e321-4d4d-8bb2-f6a50e78c864/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:11:56 +0000</pubDate>
    </item>
    <item>
      <title>84c2249f-db83-4d37-b7b6-1907a54bc821</title>
      <link>https://vulnerability.circl.lu/sighting/84c2249f-db83-4d37-b7b6-1907a54bc821/export</link>
      <description>{"uuid": "84c2249f-db83-4d37-b7b6-1907a54bc821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24461", "type": "seen", "source": "https://t.me/cibsecurity/38584", "content": "\u203c CVE-2022-24510 \u203c\n\nMicrosoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24509.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:12:06.000000Z"}</description>
      <content:encoded>{"uuid": "84c2249f-db83-4d37-b7b6-1907a54bc821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24461", "type": "seen", "source": "https://t.me/cibsecurity/38584", "content": "\u203c CVE-2022-24510 \u203c\n\nMicrosoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24509.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:12:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/84c2249f-db83-4d37-b7b6-1907a54bc821/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:12:06 +0000</pubDate>
    </item>
    <item>
      <title>8abef969-807d-425f-bd84-2f576b22d51f</title>
      <link>https://vulnerability.circl.lu/sighting/8abef969-807d-425f-bd84-2f576b22d51f/export</link>
      <description>{"uuid": "8abef969-807d-425f-bd84-2f576b22d51f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24468", "type": "seen", "source": "https://t.me/cibsecurity/38596", "content": "\u203c CVE-2022-24517 \u203c\n\nAzure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:17:58.000000Z"}</description>
      <content:encoded>{"uuid": "8abef969-807d-425f-bd84-2f576b22d51f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24468", "type": "seen", "source": "https://t.me/cibsecurity/38596", "content": "\u203c CVE-2022-24517 \u203c\n\nAzure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:17:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8abef969-807d-425f-bd84-2f576b22d51f/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:17:58 +0000</pubDate>
    </item>
    <item>
      <title>7c9be7a6-62af-4a54-9c9e-96ce0c0e0b51</title>
      <link>https://vulnerability.circl.lu/sighting/7c9be7a6-62af-4a54-9c9e-96ce0c0e0b51/export</link>
      <description>{"uuid": "7c9be7a6-62af-4a54-9c9e-96ce0c0e0b51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24467", "type": "seen", "source": "https://t.me/cibsecurity/38596", "content": "\u203c CVE-2022-24517 \u203c\n\nAzure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:17:58.000000Z"}</description>
      <content:encoded>{"uuid": "7c9be7a6-62af-4a54-9c9e-96ce0c0e0b51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24467", "type": "seen", "source": "https://t.me/cibsecurity/38596", "content": "\u203c CVE-2022-24517 \u203c\n\nAzure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:17:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c9be7a6-62af-4a54-9c9e-96ce0c0e0b51/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:17:58 +0000</pubDate>
    </item>
    <item>
      <title>9c7c3ae1-0c00-487a-b97b-20638760662f</title>
      <link>https://vulnerability.circl.lu/sighting/9c7c3ae1-0c00-487a-b97b-20638760662f/export</link>
      <description>{"uuid": "9c7c3ae1-0c00-487a-b97b-20638760662f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24462", "type": "seen", "source": "https://t.me/cibsecurity/38610", "content": "\u203c CVE-2022-24462 \u203c\n\nMicrosoft Word Security Feature Bypass Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:18:15.000000Z"}</description>
      <content:encoded>{"uuid": "9c7c3ae1-0c00-487a-b97b-20638760662f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24462", "type": "seen", "source": "https://t.me/cibsecurity/38610", "content": "\u203c CVE-2022-24462 \u203c\n\nMicrosoft Word Security Feature Bypass Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:18:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9c7c3ae1-0c00-487a-b97b-20638760662f/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:18:15 +0000</pubDate>
    </item>
    <item>
      <title>fc9da538-424f-4f1c-b5f6-95a55edf0aa8</title>
      <link>https://vulnerability.circl.lu/sighting/fc9da538-424f-4f1c-b5f6-95a55edf0aa8/export</link>
      <description>{"uuid": "fc9da538-424f-4f1c-b5f6-95a55edf0aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24469", "type": "seen", "source": "https://t.me/cibsecurity/38613", "content": "\u203c CVE-2022-24469 \u203c\n\nAzure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24506, CVE-2022-24515, CVE-2022-24518, CVE-2022-24519.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:18:20.000000Z"}</description>
      <content:encoded>{"uuid": "fc9da538-424f-4f1c-b5f6-95a55edf0aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24469", "type": "seen", "source": "https://t.me/cibsecurity/38613", "content": "\u203c CVE-2022-24469 \u203c\n\nAzure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24506, CVE-2022-24515, CVE-2022-24518, CVE-2022-24519.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:18:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fc9da538-424f-4f1c-b5f6-95a55edf0aa8/export</guid>
      <pubDate>Wed, 09 Mar 2022 20:18:20 +0000</pubDate>
    </item>
    <item>
      <title>2b7414f8-ebf7-4698-a076-e235bfeeb519</title>
      <link>https://vulnerability.circl.lu/sighting/2b7414f8-ebf7-4698-a076-e235bfeeb519/export</link>
      <description>{"uuid": "2b7414f8-ebf7-4698-a076-e235bfeeb519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24466", "type": "seen", "source": "https://t.me/cibsecurity/42270", "content": "\u203c CVE-2022-24466 \u203c\n\nWindows Hyper-V Security Feature Bypass Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:32:55.000000Z"}</description>
      <content:encoded>{"uuid": "2b7414f8-ebf7-4698-a076-e235bfeeb519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24466", "type": "seen", "source": "https://t.me/cibsecurity/42270", "content": "\u203c CVE-2022-24466 \u203c\n\nWindows Hyper-V Security Feature Bypass Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:32:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b7414f8-ebf7-4698-a076-e235bfeeb519/export</guid>
      <pubDate>Wed, 11 May 2022 00:32:55 +0000</pubDate>
    </item>
    <item>
      <title>9188a56f-49c2-426f-8e41-e9c5163dbaa2</title>
      <link>https://vulnerability.circl.lu/sighting/9188a56f-49c2-426f-8e41-e9c5163dbaa2/export</link>
      <description>{"uuid": "9188a56f-49c2-426f-8e41-e9c5163dbaa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2446", "type": "seen", "source": "https://t.me/cvedetector/5618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-2446 - WordPress WP Editor PHP Object Deserialization Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-2446 \nPublished : Sept. 13, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T17:58:05.000000Z"}</description>
      <content:encoded>{"uuid": "9188a56f-49c2-426f-8e41-e9c5163dbaa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2446", "type": "seen", "source": "https://t.me/cvedetector/5618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-2446 - WordPress WP Editor PHP Object Deserialization Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-2446 \nPublished : Sept. 13, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T17:58:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9188a56f-49c2-426f-8e41-e9c5163dbaa2/export</guid>
      <pubDate>Fri, 13 Sep 2024 17:58:05 +0000</pubDate>
    </item>
  </channel>
</rss>
