<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T19:17:27.646391+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/59720d99-d658-47e2-8765-2b7f1dd4bba2/export</id>
    <title>59720d99-d658-47e2-8765-2b7f1dd4bba2</title>
    <updated>2026-05-07T19:17:28.059120+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "59720d99-d658-47e2-8765-2b7f1dd4bba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4559", "type": "seen", "source": "https://t.me/cibsecurity/54765", "content": "\u203c CVE-2022-4559 \u203c\n\nA vulnerability was found in INEX IPX-Manager up to 6.2.0. It has been declared as problematic. This vulnerability affects unknown code of the file resources/views/customer/list.foil.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 6.3.0 is able to address this issue. The name of the patch is bc9b14c6f70cccdb89b559e8bc3a7318bfe9c243. It is recommended to upgrade the affected component. VDB-215962 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-16T20:24:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/59720d99-d658-47e2-8765-2b7f1dd4bba2/export"/>
    <published>2022-12-16T20:24:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c6b54be-ae40-4a0a-afc4-a6b4a06d8763/export</id>
    <title>1c6b54be-ae40-4a0a-afc4-a6b4a06d8763</title>
    <updated>2026-05-07T19:17:28.055565+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c6b54be-ae40-4a0a-afc4-a6b4a06d8763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45599", "type": "seen", "source": "https://t.me/cibsecurity/58716", "content": "\u203c CVE-2022-45599 \u203c\n\nAztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-23T00:52:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c6b54be-ae40-4a0a-afc4-a6b4a06d8763/export"/>
    <published>2023-02-23T00:52:15+00:00</published>
  </entry>
</feed>
