<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:35:13.467276+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/707007ef-6d1e-46ec-968a-7217ef05daa7/export</id>
    <title>707007ef-6d1e-46ec-968a-7217ef05daa7</title>
    <updated>2026-05-04T17:35:13.803214+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "707007ef-6d1e-46ec-968a-7217ef05daa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34597", "type": "seen", "source": "https://t.me/cibsecurity/45678", "content": "\u203c CVE-2022-34597 \u203c\n\nTenda AX1806 v1.0.0.1 was discovered to contain a command injection vulnerability via the function WanParameterSetting.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/707007ef-6d1e-46ec-968a-7217ef05daa7/export"/>
    <published>2022-07-06T20:14:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bd414ace-ca8d-45db-b838-b92e5b5ca818/export</id>
    <title>bd414ace-ca8d-45db-b838-b92e5b5ca818</title>
    <updated>2026-05-04T17:35:13.803147+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bd414ace-ca8d-45db-b838-b92e5b5ca818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34595", "type": "seen", "source": "https://t.me/cibsecurity/45679", "content": "\u203c CVE-2022-34595 \u203c\n\nTenda AX1803 v1.0.0.1_2890 was discovered to contain a command injection vulnerability via the function setipv6status.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bd414ace-ca8d-45db-b838-b92e5b5ca818/export"/>
    <published>2022-07-06T20:14:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9b2f1e7f-191f-4c5b-a6e0-88aabebcacaa/export</id>
    <title>9b2f1e7f-191f-4c5b-a6e0-88aabebcacaa</title>
    <updated>2026-05-04T17:35:13.803081+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9b2f1e7f-191f-4c5b-a6e0-88aabebcacaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34598", "type": "seen", "source": "https://t.me/cibsecurity/45685", "content": "\u203c CVE-2022-34598 \u203c\n\nThe udpserver in H3C Magic R100 V200R004 and V100R005 has the 9034 port opened, allowing attackers to execute arbitrary commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9b2f1e7f-191f-4c5b-a6e0-88aabebcacaa/export"/>
    <published>2022-07-06T20:14:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47abd348-0b36-4419-9b45-ecd7b1cdbf3a/export</id>
    <title>47abd348-0b36-4419-9b45-ecd7b1cdbf3a</title>
    <updated>2026-05-04T17:35:13.803014+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47abd348-0b36-4419-9b45-ecd7b1cdbf3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34596", "type": "seen", "source": "https://t.me/cibsecurity/45686", "content": "\u203c CVE-2022-34596 \u203c\n\nTenda AX1803 v1.0.0.1_2890 was discovered to contain a command injection vulnerability via the function WanParameterSetting.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47abd348-0b36-4419-9b45-ecd7b1cdbf3a/export"/>
    <published>2022-07-06T20:14:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a823b0e6-e28b-4d0f-9eaf-d7fbdef384c7/export</id>
    <title>a823b0e6-e28b-4d0f-9eaf-d7fbdef384c7</title>
    <updated>2026-05-04T17:35:13.802939+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a823b0e6-e28b-4d0f-9eaf-d7fbdef384c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34592", "type": "seen", "source": "https://t.me/cibsecurity/45775", "content": "\u203c CVE-2022-34592 \u203c\n\nWavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-07T22:15:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a823b0e6-e28b-4d0f-9eaf-d7fbdef384c7/export"/>
    <published>2022-07-07T22:15:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/69e7cdc3-6970-42cd-9e12-5ccee135d71a/export</id>
    <title>69e7cdc3-6970-42cd-9e12-5ccee135d71a</title>
    <updated>2026-05-04T17:35:13.802872+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "69e7cdc3-6970-42cd-9e12-5ccee135d71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34599", "type": "seen", "source": "https://t.me/cibsecurity/46662", "content": "\u203c CVE-2022-34599 \u203c\n\nH3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the EdittriggerList interface at /goform/aspForm.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-20T18:12:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/69e7cdc3-6970-42cd-9e12-5ccee135d71a/export"/>
    <published>2022-07-20T18:12:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94b9643f-a4f5-4e5c-bea3-1a91fabb594d/export</id>
    <title>94b9643f-a4f5-4e5c-bea3-1a91fabb594d</title>
    <updated>2026-05-04T17:35:13.802794+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94b9643f-a4f5-4e5c-bea3-1a91fabb594d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34594", "type": "seen", "source": "https://t.me/cibsecurity/47058", "content": "\u203c CVE-2022-34594 \u203c\n\nAdvanced School Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component ip/school/moudel/update_subject.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Subject text field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T07:35:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94b9643f-a4f5-4e5c-bea3-1a91fabb594d/export"/>
    <published>2022-07-27T07:35:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/884c72e3-3426-4e4c-99f9-18f2c3a8bd36/export</id>
    <title>884c72e3-3426-4e4c-99f9-18f2c3a8bd36</title>
    <updated>2026-05-04T17:35:13.802694+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "884c72e3-3426-4e4c-99f9-18f2c3a8bd36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34593", "type": "seen", "source": "https://t.me/cibsecurity/47243", "content": "\u203c CVE-2022-34593 \u203c\n\nDPTech VPN v8.1.28.0 was discovered to contain an arbitrary file read vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-29T00:12:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/884c72e3-3426-4e4c-99f9-18f2c3a8bd36/export"/>
    <published>2022-07-29T00:12:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e297ecec-cc26-461c-9fb4-670e1aac5df7/export</id>
    <title>e297ecec-cc26-461c-9fb4-670e1aac5df7</title>
    <updated>2026-05-04T17:35:13.799297+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e297ecec-cc26-461c-9fb4-670e1aac5df7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3459", "type": "seen", "source": "https://t.me/cvedetector/5665", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-3459 - WordPress WooCommerce Multiple Free Gift Plugin Gift Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-3459 \nPublished : Sept. 14, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : The WooCommerce Multiple Free Gift plugin for WordPress is vulnerable to gift manipulation in all versions up to, and including, 1.2.3. This is due to plugin not enforcing server-side checks on the products that can be added as a gift. This makes it possible for unauthenticated attackers to add non-gift items to their cart as a gift. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-14T05:40:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e297ecec-cc26-461c-9fb4-670e1aac5df7/export"/>
    <published>2024-09-14T05:40:26+00:00</published>
  </entry>
</feed>
