<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:28:07.370557+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8b18c71-6727-4b18-b08c-fbf5a8eafd8c/export</id>
    <title>a8b18c71-6727-4b18-b08c-fbf5a8eafd8c</title>
    <updated>2026-05-06T09:28:07.722522+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8b18c71-6727-4b18-b08c-fbf5a8eafd8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42753", "type": "seen", "source": "https://t.me/cibsecurity/52522", "content": "\u203c CVE-2022-42753 \u203c\n\nSalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T21:20:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8b18c71-6727-4b18-b08c-fbf5a8eafd8c/export"/>
    <published>2022-11-03T21:20:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a659654-4816-42de-bd95-ac8c9dfab5bc/export</id>
    <title>7a659654-4816-42de-bd95-ac8c9dfab5bc</title>
    <updated>2026-05-06T09:28:07.722432+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a659654-4816-42de-bd95-ac8c9dfab5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42750", "type": "seen", "source": "https://t.me/cibsecurity/52526", "content": "\u203c CVE-2022-42750 \u203c\n\nCandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T21:20:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a659654-4816-42de-bd95-ac8c9dfab5bc/export"/>
    <published>2022-11-03T21:20:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e763becb-3a1a-4f84-8fcd-48363ec0462a/export</id>
    <title>e763becb-3a1a-4f84-8fcd-48363ec0462a</title>
    <updated>2026-05-06T09:28:07.722301+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e763becb-3a1a-4f84-8fcd-48363ec0462a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42751", "type": "seen", "source": "https://t.me/cibsecurity/52528", "content": "\u203c CVE-2022-42751 \u203c\n\nCandidATS version 3.0.0 allows an external attacker to elevate privileges in the application. This is possible because the application suffers from CSRF. This allows to persuade an administrator to create a new account with administrative permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T21:20:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e763becb-3a1a-4f84-8fcd-48363ec0462a/export"/>
    <published>2022-11-03T21:20:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/72708781-ff34-4ca7-8d8d-ad48e1f7d0ad/export</id>
    <title>72708781-ff34-4ca7-8d8d-ad48e1f7d0ad</title>
    <updated>2026-05-06T09:28:07.718824+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "72708781-ff34-4ca7-8d8d-ad48e1f7d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4275", "type": "seen", "source": "https://t.me/cibsecurity/53951", "content": "\u203c CVE-2022-4275 \u203c\n\nA vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-03T18:37:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/72708781-ff34-4ca7-8d8d-ad48e1f7d0ad/export"/>
    <published>2022-12-03T18:37:59+00:00</published>
  </entry>
</feed>
