<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:49:10.595506+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/badcddaa-76eb-4725-9d6c-af5c24cb1fa7/export</id>
    <title>badcddaa-76eb-4725-9d6c-af5c24cb1fa7</title>
    <updated>2026-05-04T09:49:10.918310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "badcddaa-76eb-4725-9d6c-af5c24cb1fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1754", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T04:12:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/badcddaa-76eb-4725-9d6c-af5c24cb1fa7/export"/>
    <published>2022-12-13T04:12:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/70d84db0-197e-4f0b-b8aa-a40ddc484529/export</id>
    <title>70d84db0-197e-4f0b-b8aa-a40ddc484529</title>
    <updated>2026-05-04T09:49:10.918238+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "70d84db0-197e-4f0b-b8aa-a40ddc484529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7348", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T11:01:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/70d84db0-197e-4f0b-b8aa-a40ddc484529/export"/>
    <published>2022-12-13T11:01:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e/export</id>
    <title>dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e</title>
    <updated>2026-05-04T09:49:10.918157+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/154", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e/export"/>
    <published>2022-12-14T10:16:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b295eeaa-2523-429f-bca1-52b5c96890ce/export</id>
    <title>b295eeaa-2523-429f-bca1-52b5c96890ce</title>
    <updated>2026-05-04T09:49:10.918071+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b295eeaa-2523-429f-bca1-52b5c96890ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2137", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b295eeaa-2523-429f-bca1-52b5c96890ce/export"/>
    <published>2022-12-14T10:16:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1fb0bae5-a951-4e0c-92b4-7d5d78923f53/export</id>
    <title>1fb0bae5-a951-4e0c-92b4-7d5d78923f53</title>
    <updated>2026-05-04T09:49:10.917984+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1fb0bae5-a951-4e0c-92b4-7d5d78923f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/3436", "content": "\u200b\u200bCVE-2022-25765 \n\npdfkit Exploit Reverse Shell\n\npdfkit &amp;lt;0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765\n\nhttps://github.com/CyberArchitect1/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell\n\n\u200b\u200bCVE-2022-45025\n\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\n\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n\u200b\u200bCVE-2022-36537\n\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\n\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u200b\u200bCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bCVE-2022-45771 - Pwndoc LFI to RCE\n\nPwndoc local file inclusion to remote code execution of Node.js code on the server.\n\nhttps://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE\n\n\u200b\u200bCVE-2022-46169\n\nCacti remote_agent.php Unauthenticated Command Injection.\n\nhttps://github.com/0xf4n9x/CVE-2022-46169\n\n\u200b\u200bCVE-2022-45451\n\nPoC for CVE-2022-45451 Acronis Arbitrary File Read\n\nhttps://github.com/alfarom256/CVE-2022-45451\n\nCVE-2022-28672\n\nThis bug was Use after Free caused by improper handling of javascript object memory references.\n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nUse after Free - RCE Exploit: https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\n\u200b\u200bCVE-2003-0358\n\nBuffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges &amp;gt; via a long -s command line option.\n\nhttps://github.com/snowcra5h/CVE-2003-0358\n\n\u200b\u200bCVE-2022-39253\n\nDocker host file read\n\nhttps://github.com/ssst0n3/docker-cve-2022-39253-poc\n\n\u200b\u200bCVE-2022-48870\n\nmaccms admin+ xss attacks\n\nhttps://github.com/Cedric1314/CVE-2022-48870\n\n\u200b\u200bCVE-2022-2602\n\nPoC Kernel Privilege Escalation Linux\n\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n\u200b\u200bEvilWfshbr\n\nCVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation\n\nhttps://github.com/kkent030315/CVE-2022-42046\n\n\u200b\u200bCVE-2022-2602\n\nThis repository contains exploits for CVE-2022-2602. There are two versions of it:\n\n\u25ab\ufe0f Exploit using userfaultfd technique.\n\u25ab\ufe0f Exploit using inode locking technique.\n\nhttps://github.com/LukeGix/CVE-2022-2602\n\n#cve #poc \n@pfkgit", "creation_timestamp": "2023-01-28T19:14:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1fb0bae5-a951-4e0c-92b4-7d5d78923f53/export"/>
    <published>2023-01-28T19:14:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1bd8adcc-ad14-411d-bc2a-e8e1d42c1336/export</id>
    <title>1bd8adcc-ad14-411d-bc2a-e8e1d42c1336</title>
    <updated>2026-05-04T09:49:10.917910+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1bd8adcc-ad14-411d-bc2a-e8e1d42c1336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39060", "type": "seen", "source": "https://t.me/cibsecurity/57210", "content": "\u203c CVE-2022-39060 \u203c\n\nChangingTech MegaServiSignAdapter component has a vulnerability of improper input validation. An unauthenticated remote attacker can exploit this vulnerability to access and modify HKEY_CURRENT_USER subkey (ex: AutoRUN) in Registry where malicious scripts can be executed to take control of the system or to terminate the service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T15:11:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1bd8adcc-ad14-411d-bc2a-e8e1d42c1336/export"/>
    <published>2023-01-31T15:11:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d71c42ee-3dc4-4039-ace5-89b2e3651ebf/export</id>
    <title>d71c42ee-3dc4-4039-ace5-89b2e3651ebf</title>
    <updated>2026-05-04T09:49:10.917835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d71c42ee-3dc4-4039-ace5-89b2e3651ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39068", "type": "seen", "source": "https://t.me/cvedetector/5899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-39068 - ZTE MF296R SMS Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-39068 \nPublished : Sept. 18, 2024, 2:15 a.m. | 37\u00a0minutes ago \nDescription : There is a buffer overflow vulnerability in ZTE MF296R. Due to insufficient validation of the SMS parameter length, an authenticated attacker could use the vulnerability to perform a denial of service attack. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T05:00:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d71c42ee-3dc4-4039-ace5-89b2e3651ebf/export"/>
    <published>2024-09-18T05:00:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9bb52f58-6440-43a4-a85d-d052ae98a14d/export</id>
    <title>9bb52f58-6440-43a4-a85d-d052ae98a14d</title>
    <updated>2026-05-04T09:49:10.917752+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9bb52f58-6440-43a4-a85d-d052ae98a14d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39066\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.\n\ud83d\udccf Published: 2022-11-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T04:32:36.772Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027744", "creation_timestamp": "2025-04-29T05:11:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9bb52f58-6440-43a4-a85d-d052ae98a14d/export"/>
    <published>2025-04-29T05:11:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e3d388b-3446-4129-b126-a254a768e325/export</id>
    <title>5e3d388b-3446-4129-b126-a254a768e325</title>
    <updated>2026-05-04T09:49:10.917650+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e3d388b-3446-4129-b126-a254a768e325", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39067", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39067\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a buffer overflow vulnerability in ZTE MF286R. Due to lack of input validation on parameters of the wifi interface, an authenticated attacker could use the vulnerability to perform a denial of service attack.\n\ud83d\udccf Published: 2022-11-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T04:31:08.545Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784", "creation_timestamp": "2025-04-29T05:11:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e3d388b-3446-4129-b126-a254a768e325/export"/>
    <published>2025-04-29T05:11:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc3d0426-2a2e-4323-9f3b-70342cc5db75/export</id>
    <title>fc3d0426-2a2e-4323-9f3b-70342cc5db75</title>
    <updated>2026-05-04T09:49:10.915416+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc3d0426-2a2e-4323-9f3b-70342cc5db75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39069", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14280", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39069\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a SQL injection vulnerability in ZTE ZAIP-AIE. Due to lack of input verification by the server, an attacker could trigger an attack by building malicious requests. Exploitation of this vulnerability could cause the leakage of the current table content.\n\ud83d\udccf Published: 2022-11-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T14:08:18.523Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1026604", "creation_timestamp": "2025-05-01T14:15:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc3d0426-2a2e-4323-9f3b-70342cc5db75/export"/>
    <published>2025-05-01T14:15:15+00:00</published>
  </entry>
</feed>
