<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:25:09.911389+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/908449d3-d040-4429-8289-0f91deb73271/export</id>
    <title>908449d3-d040-4429-8289-0f91deb73271</title>
    <updated>2026-05-04T10:25:10.246632+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "908449d3-d040-4429-8289-0f91deb73271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32572", "type": "seen", "source": "https://t.me/cibsecurity/48546", "content": "\u203c CVE-2022-32572 \u203c\n\nAn os command injection vulnerability exists in the aVideoEncoder wget functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-22T22:20:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/908449d3-d040-4429-8289-0f91deb73271/export"/>
    <published>2022-08-22T22:20:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ae52e34e-f5ae-441e-b451-6d77ca51b234/export</id>
    <title>ae52e34e-f5ae-441e-b451-6d77ca51b234</title>
    <updated>2026-05-04T10:25:10.246466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ae52e34e-f5ae-441e-b451-6d77ca51b234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3257", "type": "seen", "source": "https://t.me/cibsecurity/50347", "content": "\u203c CVE-2022-3257 \u203c\n\nMattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T18:19:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ae52e34e-f5ae-441e-b451-6d77ca51b234/export"/>
    <published>2022-09-23T18:19:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ec8c03ee-166c-4e95-a4ac-2345b4e46d83/export</id>
    <title>ec8c03ee-166c-4e95-a4ac-2345b4e46d83</title>
    <updated>2026-05-04T10:25:10.246309+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ec8c03ee-166c-4e95-a4ac-2345b4e46d83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32574", "type": "seen", "source": "https://t.me/cibsecurity/52055", "content": "\u203c CVE-2022-32574 \u203c\n\nA double-free vulnerability exists in the web interface /action/ipcamSetParamPost functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to memory corruption. An attacker can make an authenticated HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-25T20:40:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ec8c03ee-166c-4e95-a4ac-2345b4e46d83/export"/>
    <published>2022-10-25T20:40:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ede2ac3d-10cd-4a60-b074-0ea95f073dce/export</id>
    <title>ede2ac3d-10cd-4a60-b074-0ea95f073dce</title>
    <updated>2026-05-04T10:25:10.246144+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ede2ac3d-10cd-4a60-b074-0ea95f073dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32570", "type": "seen", "source": "https://t.me/cibsecurity/58374", "content": "\u203c CVE-2022-32570 \u203c\n\nImproper authentication in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:26:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ede2ac3d-10cd-4a60-b074-0ea95f073dce/export"/>
    <published>2023-02-16T22:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/daeafa4b-a498-4650-aad6-561eb5eb776e/export</id>
    <title>daeafa4b-a498-4650-aad6-561eb5eb776e</title>
    <updated>2026-05-04T10:25:10.245965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "daeafa4b-a498-4650-aad6-561eb5eb776e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32575", "type": "seen", "source": "https://t.me/cibsecurity/58408", "content": "\u203c CVE-2022-32575 \u203c\n\nOut-of-bounds write in the Intel(R) Trace Analyzer and Collector software before version 2021.5 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:12:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/daeafa4b-a498-4650-aad6-561eb5eb776e/export"/>
    <published>2023-02-17T00:12:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/80bc99a6-7c05-4731-9923-d1c45def63ea/export</id>
    <title>80bc99a6-7c05-4731-9923-d1c45def63ea</title>
    <updated>2026-05-04T10:25:10.245745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "80bc99a6-7c05-4731-9923-d1c45def63ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32577", "type": "seen", "source": "https://t.me/cibsecurity/63787", "content": "\u203c CVE-2022-32577 \u203c\n\nImproper input validation in BIOS Firmware for some Intel(R) NUC Kits before version PY0081 may allow a privileged user to potentially enable information disclosure or denial of service via local access\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:28:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/80bc99a6-7c05-4731-9923-d1c45def63ea/export"/>
    <published>2023-05-10T18:28:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3d8f9466-90d2-440e-ad16-4423ee1bca4c/export</id>
    <title>3d8f9466-90d2-440e-ad16-4423ee1bca4c</title>
    <updated>2026-05-04T10:25:10.243327+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3d8f9466-90d2-440e-ad16-4423ee1bca4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32572", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11883", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-32572\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An os command injection vulnerability exists in the aVideoEncoder wget functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2022-08-22T18:25:36.378Z\n\ud83d\udccf Modified: 2025-04-15T18:51:01.854Z\n\ud83d\udd17 References:\n1. https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql\n2. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548", "creation_timestamp": "2025-04-15T18:54:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3d8f9466-90d2-440e-ad16-4423ee1bca4c/export"/>
    <published>2025-04-15T18:54:52+00:00</published>
  </entry>
</feed>
