<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-29T23:09:04.540568+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/79ace0e8-7d5f-4473-a2e8-a5879b7dac3b/export</id>
    <title>79ace0e8-7d5f-4473-a2e8-a5879b7dac3b</title>
    <updated>2026-04-29T23:09:04.951215+00:00</updated>
    <author>
      <name>yeahBoy</name>
      <uri>http://vulnerability.circl.lu/user/datdude</uri>
    </author>
    <content>{"uuid": "79ace0e8-7d5f-4473-a2e8-a5879b7dac3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2012-2629", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/18886", "content": "", "creation_timestamp": "2012-05-16T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/79ace0e8-7d5f-4473-a2e8-a5879b7dac3b/export"/>
    <published>2012-05-16T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3eac5bec-133e-4e52-9504-6d10304bb44a/export</id>
    <title>3eac5bec-133e-4e52-9504-6d10304bb44a</title>
    <updated>2026-04-29T23:09:04.949106+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3eac5bec-133e-4e52-9504-6d10304bb44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-2629", "type": "seen", "source": "https://t.me/cibsecurity/9949", "content": "ATENTION\u203c New - CVE-2012-2629\n\nMultiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-02-20T07:52:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3eac5bec-133e-4e52-9504-6d10304bb44a/export"/>
    <published>2020-02-20T07:52:03+00:00</published>
  </entry>
</feed>
