<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 18:41:02 +0000</lastBuildDate>
    <item>
      <title>69d87049-901c-458e-9b86-a24781506c46</title>
      <link>https://vulnerability.circl.lu/sighting/69d87049-901c-458e-9b86-a24781506c46/export</link>
      <description>{"uuid": "69d87049-901c-458e-9b86-a24781506c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35198", "type": "seen", "source": "https://t.me/cibsecurity/48327", "content": "\u203c CVE-2022-35198 \u203c\n\nContract Management System v2.0 contains a weak default password which gives attackers to access database connection information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-18T12:41:11.000000Z"}</description>
      <content:encoded>{"uuid": "69d87049-901c-458e-9b86-a24781506c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35198", "type": "seen", "source": "https://t.me/cibsecurity/48327", "content": "\u203c CVE-2022-35198 \u203c\n\nContract Management System v2.0 contains a weak default password which gives attackers to access database connection information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-18T12:41:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/69d87049-901c-458e-9b86-a24781506c46/export</guid>
      <pubDate>Thu, 18 Aug 2022 12:41:11 +0000</pubDate>
    </item>
    <item>
      <title>630ee369-040c-4453-9896-08ea02e4efc7</title>
      <link>https://vulnerability.circl.lu/sighting/630ee369-040c-4453-9896-08ea02e4efc7/export</link>
      <description>{"uuid": "630ee369-040c-4453-9896-08ea02e4efc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35191", "type": "seen", "source": "https://t.me/cibsecurity/48562", "content": "\u203c CVE-2022-35191 \u203c\n\nD-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via a crafted HTTP connection request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T13:10:36.000000Z"}</description>
      <content:encoded>{"uuid": "630ee369-040c-4453-9896-08ea02e4efc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35191", "type": "seen", "source": "https://t.me/cibsecurity/48562", "content": "\u203c CVE-2022-35191 \u203c\n\nD-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via a crafted HTTP connection request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T13:10:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/630ee369-040c-4453-9896-08ea02e4efc7/export</guid>
      <pubDate>Tue, 23 Aug 2022 13:10:36 +0000</pubDate>
    </item>
    <item>
      <title>307e1444-b465-41df-9640-e687fe758334</title>
      <link>https://vulnerability.circl.lu/sighting/307e1444-b465-41df-9640-e687fe758334/export</link>
      <description>{"uuid": "307e1444-b465-41df-9640-e687fe758334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35192", "type": "seen", "source": "https://t.me/cibsecurity/48834", "content": "\u203c CVE-2022-35192 \u203c\n\nD-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T07:29:35.000000Z"}</description>
      <content:encoded>{"uuid": "307e1444-b465-41df-9640-e687fe758334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35192", "type": "seen", "source": "https://t.me/cibsecurity/48834", "content": "\u203c CVE-2022-35192 \u203c\n\nD-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T07:29:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/307e1444-b465-41df-9640-e687fe758334/export</guid>
      <pubDate>Fri, 26 Aug 2022 07:29:35 +0000</pubDate>
    </item>
    <item>
      <title>6d23a99a-8cd5-4b9c-b3d6-25554ed8c822</title>
      <link>https://vulnerability.circl.lu/sighting/6d23a99a-8cd5-4b9c-b3d6-25554ed8c822/export</link>
      <description>{"uuid": "6d23a99a-8cd5-4b9c-b3d6-25554ed8c822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35193", "type": "seen", "source": "https://t.me/cibsecurity/49925", "content": "\u203c CVE-2022-35193 \u203c\n\nTestLink v1.9.20 was discovered to contain a SQL injection vulnerability via /lib/execute/execNavigator.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T20:28:50.000000Z"}</description>
      <content:encoded>{"uuid": "6d23a99a-8cd5-4b9c-b3d6-25554ed8c822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35193", "type": "seen", "source": "https://t.me/cibsecurity/49925", "content": "\u203c CVE-2022-35193 \u203c\n\nTestLink v1.9.20 was discovered to contain a SQL injection vulnerability via /lib/execute/execNavigator.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T20:28:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6d23a99a-8cd5-4b9c-b3d6-25554ed8c822/export</guid>
      <pubDate>Fri, 16 Sep 2022 20:28:50 +0000</pubDate>
    </item>
    <item>
      <title>f5d02cdd-7648-4e1e-9329-e7da897bb891</title>
      <link>https://vulnerability.circl.lu/sighting/f5d02cdd-7648-4e1e-9329-e7da897bb891/export</link>
      <description>{"uuid": "f5d02cdd-7648-4e1e-9329-e7da897bb891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35195", "type": "seen", "source": "https://t.me/cibsecurity/49932", "content": "\u203c CVE-2022-35195 \u203c\n\nTestLink 1.9.20 Raijin was discovered to contain a broken access control vulnerability at /lib/attachments/attachmentdownload.php\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T20:29:00.000000Z"}</description>
      <content:encoded>{"uuid": "f5d02cdd-7648-4e1e-9329-e7da897bb891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35195", "type": "seen", "source": "https://t.me/cibsecurity/49932", "content": "\u203c CVE-2022-35195 \u203c\n\nTestLink 1.9.20 Raijin was discovered to contain a broken access control vulnerability at /lib/attachments/attachmentdownload.php\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T20:29:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f5d02cdd-7648-4e1e-9329-e7da897bb891/export</guid>
      <pubDate>Fri, 16 Sep 2022 20:29:00 +0000</pubDate>
    </item>
    <item>
      <title>575420e3-cb0c-4f8f-8d7e-9229ee8d3e8f</title>
      <link>https://vulnerability.circl.lu/sighting/575420e3-cb0c-4f8f-8d7e-9229ee8d3e8f/export</link>
      <description>{"uuid": "575420e3-cb0c-4f8f-8d7e-9229ee8d3e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3519", "type": "seen", "source": "https://t.me/cibsecurity/51524", "content": "\u203c CVE-2022-3519 \u203c\n\nA vulnerability classified as problematic was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Quote Requests Tab. The manipulation of the argument Manage Remarks leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-211015.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-15T15:04:41.000000Z"}</description>
      <content:encoded>{"uuid": "575420e3-cb0c-4f8f-8d7e-9229ee8d3e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3519", "type": "seen", "source": "https://t.me/cibsecurity/51524", "content": "\u203c CVE-2022-3519 \u203c\n\nA vulnerability classified as problematic was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Quote Requests Tab. The manipulation of the argument Manage Remarks leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-211015.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-15T15:04:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/575420e3-cb0c-4f8f-8d7e-9229ee8d3e8f/export</guid>
      <pubDate>Sat, 15 Oct 2022 15:04:41 +0000</pubDate>
    </item>
  </channel>
</rss>
