<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T14:34:53.985774+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export</id>
    <title>2e03ae3a-4942-4ce4-9cb8-37c620aeeec7</title>
    <updated>2026-05-01T14:34:54.315061+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e03ae3a-4942-4ce4-9cb8-37c620aeeec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30007", "type": "seen", "source": "https://t.me/cibsecurity/42838", "content": "\u203c CVE-2022-30007 \u203c\n\nGXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T20:27:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export"/>
    <published>2022-05-17T20:27:48+00:00</published>
  </entry>
</feed>
