<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:34:09.060921+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/49bc8cfb-cf73-495f-8642-b590a7833769/export</id>
    <title>49bc8cfb-cf73-495f-8642-b590a7833769</title>
    <updated>2026-05-04T17:34:09.358430+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "49bc8cfb-cf73-495f-8642-b590a7833769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20755", "type": "seen", "source": "https://t.me/NeKaspersky/1922", "content": "\u041d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 Cisco \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438 2 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0431\u0430\u0433\u0430 \u0432 \u0434\u0435\u0432\u0430\u0439\u0441\u0430\u0445 Expressway \u0438 TelePresence Video Communication Server (VCS)\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0435 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b CVE-2022-20754 \u0438 CVE-2022-20755 (\u043e\u0431\u0435 9 \u043f\u043e CVSS), \u0432\u044b\u0437\u0432\u0430\u043d\u044b \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0434\u043e\u043b\u0436\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432, \u043f\u043e\u0434\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e*, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0430\u0442\u044c\u0441\u044f \u043f\u043e \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043f\u0438\u0441\u0430\u0442\u044c \u0432 \u043b\u044e\u0431\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0438 \u0434\u0430\u0436\u0435 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e root.\n\n\"\u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0433\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0414\u0436\u0435\u0439\u0441\u043e\u043d\u043e\u043c \u041a\u0440\u0430\u0443\u0434\u0435\u0440\u043e\u043c \u0438\u0437 Cisco Advanced Security Initiatives Group (ASIG)\", - \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432 \u0441\u0432\u043e\u0435\u043c \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432 \u0441\u0440\u0435\u0434\u0443.\n\n* \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u043b\u0430 CWE (Common weakness enumeration, \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0447\u0430\u0441\u0442\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0438\u0445\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439) \u0434\u0430\u043d\u043d\u044b\u0445 \u0431\u0430\u0433\u043e\u0432: 23 \u0438 78.\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u0438\u0437 \u043d\u0438\u0445 \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u00abRelative Path Traversal\u00bb \u0438 \u0432\u044b\u0437\u0432\u0430\u043d \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432 ../, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043b\u044e\u0431\u043e\u043c\u0443 \u0444\u0430\u0439\u043b\u0443 \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043d\u0443\u0436\u043d\u044b\u0445 \u043f\u0440\u0430\u0432 \u0438 \u0437\u043d\u0430\u043d\u0438\u044e \u043f\u0443\u0442\u0438 \u043a \u043d\u0435\u043c\u0443.\n\n\u0412\u0442\u043e\u0440\u043e\u0439 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u00abOS Command Injection\u00bb \u0438 \u0432 \u043e\u0431\u0449\u0435\u043c-\u0442\u043e \u043f\u043e\u0445\u043e\u0436 \u043d\u0430 \u0432\u0441\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0438\u043d\u0436\u0435\u043a\u0442\u044b: \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043a\u0438\u043c-\u043b\u0438\u0431\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u044e\u0442\u0441\u044f. \u0412 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u043a\u0430\u043a \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0438\u0437 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u044f, \u0438\u0445 \u0432 \u0438\u0442\u043e\u0433\u0435 \u0441\u043a\u0430\u0440\u043c\u043b\u0438\u0432\u0430\u044e\u0442 \u043a\u0430\u043a\u043e\u0439-\u0442\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u0435. \u0420\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0432\u0441\u0435 \u043e\u0431\u044b\u0447\u043d\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c: \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u043c, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043c\u043e\u0436\u043d\u043e \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043a\u0430\u043a\u043e\u0439-\u043d\u0438\u0431\u0443\u0434\u044c \u0444\u0430\u0439\u043b, \u0434\u043b\u044f \u0447\u0435\u0433\u043e \u0433\u0434\u0435-\u0442\u043e \u0432 \u043a\u043e\u0434\u0435 \u0437\u043e\u0432\u0435\u0442\u0441\u044f rm user_input, \u043d\u043e \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0439 user_input \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f, \u0441\u043a\u0430\u0436\u0435\u043c, \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0432 \u043d\u0435\u043c ';' \u2014 \u0441\u0438\u043c\u0432\u043e\u043b\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0433\u043e \u0432 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043a\u043e\u043c\u0430\u043d\u0434. \u041f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u00ab\u0443\u0434\u0430\u043b\u0438\u0442\u044c\u00bb \u0444\u0430\u0439\u043b random_junk; reboot, \u0438 \u044d\u0442\u043e \u0432\u044b\u043b\u044c\u0435\u0442\u0441\u044f \u0432 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n@NeKaspersky", "creation_timestamp": "2022-03-03T19:53:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/49bc8cfb-cf73-495f-8642-b590a7833769/export"/>
    <published>2022-03-03T19:53:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86278f0a-e990-413f-9fc6-18f8e0011ebc/export</id>
    <title>86278f0a-e990-413f-9fc6-18f8e0011ebc</title>
    <updated>2026-05-04T17:34:09.358317+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86278f0a-e990-413f-9fc6-18f8e0011ebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20754", "type": "seen", "source": "https://t.me/NeKaspersky/1922", "content": "\u041d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 Cisco \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438 2 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0431\u0430\u0433\u0430 \u0432 \u0434\u0435\u0432\u0430\u0439\u0441\u0430\u0445 Expressway \u0438 TelePresence Video Communication Server (VCS)\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0435 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b CVE-2022-20754 \u0438 CVE-2022-20755 (\u043e\u0431\u0435 9 \u043f\u043e CVSS), \u0432\u044b\u0437\u0432\u0430\u043d\u044b \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0434\u043e\u043b\u0436\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432, \u043f\u043e\u0434\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e*, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0430\u0442\u044c\u0441\u044f \u043f\u043e \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043f\u0438\u0441\u0430\u0442\u044c \u0432 \u043b\u044e\u0431\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0438 \u0434\u0430\u0436\u0435 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e root.\n\n\"\u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0433\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0414\u0436\u0435\u0439\u0441\u043e\u043d\u043e\u043c \u041a\u0440\u0430\u0443\u0434\u0435\u0440\u043e\u043c \u0438\u0437 Cisco Advanced Security Initiatives Group (ASIG)\", - \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432 \u0441\u0432\u043e\u0435\u043c \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432 \u0441\u0440\u0435\u0434\u0443.\n\n* \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u043b\u0430 CWE (Common weakness enumeration, \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0447\u0430\u0441\u0442\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u044e\u0449\u0438\u0445\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439) \u0434\u0430\u043d\u043d\u044b\u0445 \u0431\u0430\u0433\u043e\u0432: 23 \u0438 78.\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u0438\u0437 \u043d\u0438\u0445 \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u00abRelative Path Traversal\u00bb \u0438 \u0432\u044b\u0437\u0432\u0430\u043d \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432 ../, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043b\u044e\u0431\u043e\u043c\u0443 \u0444\u0430\u0439\u043b\u0443 \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043d\u0443\u0436\u043d\u044b\u0445 \u043f\u0440\u0430\u0432 \u0438 \u0437\u043d\u0430\u043d\u0438\u044e \u043f\u0443\u0442\u0438 \u043a \u043d\u0435\u043c\u0443.\n\n\u0412\u0442\u043e\u0440\u043e\u0439 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u00abOS Command Injection\u00bb \u0438 \u0432 \u043e\u0431\u0449\u0435\u043c-\u0442\u043e \u043f\u043e\u0445\u043e\u0436 \u043d\u0430 \u0432\u0441\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0438\u043d\u0436\u0435\u043a\u0442\u044b: \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043a\u0438\u043c-\u043b\u0438\u0431\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u044e\u0442\u0441\u044f. \u0412 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u043a\u0430\u043a \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0438\u0437 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u044f, \u0438\u0445 \u0432 \u0438\u0442\u043e\u0433\u0435 \u0441\u043a\u0430\u0440\u043c\u043b\u0438\u0432\u0430\u044e\u0442 \u043a\u0430\u043a\u043e\u0439-\u0442\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u0435. \u0420\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0432\u0441\u0435 \u043e\u0431\u044b\u0447\u043d\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c: \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u043c, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043c\u043e\u0436\u043d\u043e \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043a\u0430\u043a\u043e\u0439-\u043d\u0438\u0431\u0443\u0434\u044c \u0444\u0430\u0439\u043b, \u0434\u043b\u044f \u0447\u0435\u0433\u043e \u0433\u0434\u0435-\u0442\u043e \u0432 \u043a\u043e\u0434\u0435 \u0437\u043e\u0432\u0435\u0442\u0441\u044f rm user_input, \u043d\u043e \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0439 user_input \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f, \u0441\u043a\u0430\u0436\u0435\u043c, \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0432 \u043d\u0435\u043c ';' \u2014 \u0441\u0438\u043c\u0432\u043e\u043b\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0433\u043e \u0432 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043a\u043e\u043c\u0430\u043d\u0434. \u041f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u00ab\u0443\u0434\u0430\u043b\u0438\u0442\u044c\u00bb \u0444\u0430\u0439\u043b random_junk; reboot, \u0438 \u044d\u0442\u043e \u0432\u044b\u043b\u044c\u0435\u0442\u0441\u044f \u0432 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n@NeKaspersky", "creation_timestamp": "2022-03-03T19:53:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86278f0a-e990-413f-9fc6-18f8e0011ebc/export"/>
    <published>2022-03-03T19:53:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8acd340-053f-480e-bd17-99b4c14323b1/export</id>
    <title>a8acd340-053f-480e-bd17-99b4c14323b1</title>
    <updated>2026-05-04T17:34:09.358237+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8acd340-053f-480e-bd17-99b4c14323b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20756", "type": "seen", "source": "https://t.me/cibsecurity/40254", "content": "\u203c CVE-2022-20756 \u203c\n\nA vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by attempting to authenticate to a network or a service where the access server is using Cisco ISE as the RADIUS server. A successful exploit could allow the attacker to cause Cisco ISE to stop processing RADIUS requests, causing authentication/authorization timeouts, which would then result in legitimate requests being denied access. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) is required. See the Details section for more information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-06T22:30:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8acd340-053f-480e-bd17-99b4c14323b1/export"/>
    <published>2022-04-06T22:30:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/62c89081-adef-42a3-9b20-6be3de1c3024/export</id>
    <title>62c89081-adef-42a3-9b20-6be3de1c3024</title>
    <updated>2026-05-04T17:34:09.358159+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "62c89081-adef-42a3-9b20-6be3de1c3024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20755", "type": "seen", "source": "https://t.me/cibsecurity/40259", "content": "\u203c CVE-2022-20755 \u203c\n\nMultiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-06T22:30:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/62c89081-adef-42a3-9b20-6be3de1c3024/export"/>
    <published>2022-04-06T22:30:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed216755-3a32-42bb-96f4-6b81b8d8abf9/export</id>
    <title>ed216755-3a32-42bb-96f4-6b81b8d8abf9</title>
    <updated>2026-05-04T17:34:09.358086+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed216755-3a32-42bb-96f4-6b81b8d8abf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20754", "type": "seen", "source": "https://t.me/cibsecurity/40263", "content": "\u203c CVE-2022-20754 \u203c\n\nMultiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-06T22:30:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed216755-3a32-42bb-96f4-6b81b8d8abf9/export"/>
    <published>2022-04-06T22:30:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3260d400-7261-47e5-9cbd-22d5fb7f9363/export</id>
    <title>3260d400-7261-47e5-9cbd-22d5fb7f9363</title>
    <updated>2026-05-04T17:34:09.357994+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3260d400-7261-47e5-9cbd-22d5fb7f9363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20753", "type": "seen", "source": "https://t.me/cibsecurity/41930", "content": "\u203c CVE-2022-20753 \u203c\n\nA vulnerability in web-based management interface of Cisco Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to an affected device. A successful exploit could allow the attacker to execute remote code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T20:35:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3260d400-7261-47e5-9cbd-22d5fb7f9363/export"/>
    <published>2022-05-04T20:35:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e73353b4-9877-40b4-bdca-83c02bee4ab8/export</id>
    <title>e73353b4-9877-40b4-bdca-83c02bee4ab8</title>
    <updated>2026-05-04T17:34:09.357897+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e73353b4-9877-40b4-bdca-83c02bee4ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20752", "type": "seen", "source": "https://t.me/cibsecurity/45703", "content": "\u203c CVE-2022-20752 \u203c\n\nA vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient protection of a system password. An attacker could exploit this vulnerability by observing the time it takes the system to respond to various queries. A successful exploit could allow the attacker to determine a sensitive system password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-07T00:14:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e73353b4-9877-40b4-bdca-83c02bee4ab8/export"/>
    <published>2022-07-07T00:14:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fac13349-9a09-434b-90fd-fc07958a2c05/export</id>
    <title>fac13349-9a09-434b-90fd-fc07958a2c05</title>
    <updated>2026-05-04T17:34:09.357801+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fac13349-9a09-434b-90fd-fc07958a2c05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2075", "type": "seen", "source": "https://t.me/cibsecurity/48426", "content": "\u203c CVE-2022-2075 \u203c\n\nIn affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service targeting the build information request validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-19T12:17:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fac13349-9a09-434b-90fd-fc07958a2c05/export"/>
    <published>2022-08-19T12:17:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bb89878c-038d-4f32-954c-7777098ee425/export</id>
    <title>bb89878c-038d-4f32-954c-7777098ee425</title>
    <updated>2026-05-04T17:34:09.357483+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bb89878c-038d-4f32-954c-7777098ee425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20759", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.page/post/3m4cczl4gjz2p", "content": "", "creation_timestamp": "2025-10-29T01:42:34.476000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bb89878c-038d-4f32-954c-7777098ee425/export"/>
    <published>2025-10-29T01:42:34.476000+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1487e67c-dd2d-41ab-86ce-574af0303cb7/export</id>
    <title>1487e67c-dd2d-41ab-86ce-574af0303cb7</title>
    <updated>2026-05-04T17:34:09.353194+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1487e67c-dd2d-41ab-86ce-574af0303cb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20759", "type": "seen", "source": "https://gist.github.com/Darkcrai86/79a4494747c3c1036b9844b862dd8c05", "content": "", "creation_timestamp": "2025-10-29T08:06:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1487e67c-dd2d-41ab-86ce-574af0303cb7/export"/>
    <published>2025-10-29T08:06:31+00:00</published>
  </entry>
</feed>
