<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T19:26:23.857193+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/afaef02b-d327-4cb7-a196-053501a1f54f/export</id>
    <title>afaef02b-d327-4cb7-a196-053501a1f54f</title>
    <updated>2026-05-07T19:26:24.264845+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "afaef02b-d327-4cb7-a196-053501a1f54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "seen", "source": "https://t.me/cibsecurity/45834", "content": "\u203c CVE-2022-35411 \u203c\n\nrpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-08T22:18:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/afaef02b-d327-4cb7-a196-053501a1f54f/export"/>
    <published>2022-07-08T22:18:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6081b26f-1248-4d9b-9b86-60c1ffbcc724/export</id>
    <title>6081b26f-1248-4d9b-9b86-60c1ffbcc724</title>
    <updated>2026-05-07T19:26:24.264728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6081b26f-1248-4d9b-9b86-60c1ffbcc724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7168", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1arpc.py 0.6.0 - Remote Code Execution (RCE)\nURL\uff1ahttps://github.com/fuzzlove/CVE-2022-35411\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-04-25T11:10:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6081b26f-1248-4d9b-9b86-60c1ffbcc724/export"/>
    <published>2024-04-25T11:10:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23353d9f-0322-4309-a27b-bfa633b3493e/export</id>
    <title>23353d9f-0322-4309-a27b-bfa633b3493e</title>
    <updated>2026-05-07T19:26:24.264572+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23353d9f-0322-4309-a27b-bfa633b3493e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45668", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit for CVE-2022-35411 \u2014 Unauthenticated RCE in rpc.py (&amp;lt;= 0.6.0)\nURL\uff1ahttps://github.com/CSpanias/rpc-rce.py\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-07-28T09:31:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23353d9f-0322-4309-a27b-bfa633b3493e/export"/>
    <published>2025-07-28T09:31:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b8c41f6-321a-406a-b26a-0da9d12908fc/export</id>
    <title>5b8c41f6-321a-406a-b26a-0da9d12908fc</title>
    <updated>2026-05-07T19:26:24.261215+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b8c41f6-321a-406a-b26a-0da9d12908fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "Telegram/Fl_ltFZIbiQsMNPTYivk2KXEOFXqbKjLz4yAp3sglbIHJYU", "content": "", "creation_timestamp": "2025-07-28T15:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b8c41f6-321a-406a-b26a-0da9d12908fc/export"/>
    <published>2025-07-28T15:00:06+00:00</published>
  </entry>
</feed>
