<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:26:17.526584+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2e092e7-6372-4dc6-bc3c-4d81b0357b33/export</id>
    <title>f2e092e7-6372-4dc6-bc3c-4d81b0357b33</title>
    <updated>2026-05-06T11:26:17.885895+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2e092e7-6372-4dc6-bc3c-4d81b0357b33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27607", "type": "seen", "source": "https://t.me/cibsecurity/39358", "content": "\u203c CVE-2022-27607 \u203c\n\nBento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a related issue to CVE-2018-14531.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-22T01:26:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2e092e7-6372-4dc6-bc3c-4d81b0357b33/export"/>
    <published>2022-03-22T01:26:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73274d18-0b60-42e5-b923-4301eb7c284d/export</id>
    <title>73274d18-0b60-42e5-b923-4301eb7c284d</title>
    <updated>2026-05-06T11:26:17.885825+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73274d18-0b60-42e5-b923-4301eb7c284d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27609", "type": "seen", "source": "https://t.me/cibsecurity/40125", "content": "\u203c CVE-2022-27609 \u203c\n\nForcepoint One Endpoint prior to version 22.01 installed on Microsoft Windows does not provide sufficient anti-tampering protection of services by users with Administrator privileges. This could result in a user to disable Forcepoint One Endpoint and the protection offered by it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73274d18-0b60-42e5-b923-4301eb7c284d/export"/>
    <published>2022-04-05T00:28:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b571dc7e-1d0b-44da-98c6-3f62a9877217/export</id>
    <title>b571dc7e-1d0b-44da-98c6-3f62a9877217</title>
    <updated>2026-05-06T11:26:17.885751+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b571dc7e-1d0b-44da-98c6-3f62a9877217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2760", "type": "seen", "source": "https://t.me/cibsecurity/50577", "content": "\u203c CVE-2022-2760 \u203c\n\nIn affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T16:34:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b571dc7e-1d0b-44da-98c6-3f62a9877217/export"/>
    <published>2022-09-28T16:34:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/259c0b0d-91a4-4abc-94db-6269ccc365d2/export</id>
    <title>259c0b0d-91a4-4abc-94db-6269ccc365d2</title>
    <updated>2026-05-06T11:26:17.885649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "259c0b0d-91a4-4abc-94db-6269ccc365d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113677066767895139", "content": "", "creation_timestamp": "2024-12-19T02:13:03.634039Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/259c0b0d-91a4-4abc-94db-6269ccc365d2/export"/>
    <published>2024-12-19T02:13:03.634039+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cd408955-f677-43fb-b274-b7a0df8272aa/export</id>
    <title>cd408955-f677-43fb-b274-b7a0df8272aa</title>
    <updated>2026-05-06T11:26:17.883618+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cd408955-f677-43fb-b274-b7a0df8272aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://t.me/cvedetector/13304", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27600 - QNAP QTS and QuTS hero QuTScloud Uncontrolled Resource Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27600 \nPublished : Dec. 19, 2024, 2:15 a.m. | 40\u00a0minutes ago \nDescription : An uncontrolled resource consumption vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to launch a denial-of-service (DoS) attack. \n \nWe have already fixed the vulnerability in the following versions: \nQTS 5.0.1.2277 and later \nQTS 4.5.4.2280 build 20230112 and later \nQuTS hero h5.0.1.2277 build 20230112 and later \nQuTS hero h4.5.4.2374 build 20230417 and later \nQuTScloud c5.0.1.2374 and later \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T03:55:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cd408955-f677-43fb-b274-b7a0df8272aa/export"/>
    <published>2024-12-19T03:55:52+00:00</published>
  </entry>
</feed>
