<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:57:38.235765+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c92301b-ee2f-457b-8651-e40af10c9513/export</id>
    <title>5c92301b-ee2f-457b-8651-e40af10c9513</title>
    <updated>2026-05-06T10:57:38.625720+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c92301b-ee2f-457b-8651-e40af10c9513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4637", "type": "seen", "source": "https://t.me/cibsecurity/55090", "content": "\u203c CVE-2022-4637 \u203c\n\nA vulnerability classified as problematic has been found in ep3-bs 1.8.0. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.1 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-22T00:13:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c92301b-ee2f-457b-8651-e40af10c9513/export"/>
    <published>2022-12-22T00:13:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba60fdfc-72f8-4db7-ba05-412ace8598e6/export</id>
    <title>ba60fdfc-72f8-4db7-ba05-412ace8598e6</title>
    <updated>2026-05-06T10:57:38.625622+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba60fdfc-72f8-4db7-ba05-412ace8598e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46370", "type": "seen", "source": "https://t.me/cibsecurity/56428", "content": "\u203c CVE-2022-46370 \u203c\n\nRumpus - FTP server version 9.0.7.1 Improper Token Verification\u00e2\u20ac\u201c vulnerability may allow bypassing identity verification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba60fdfc-72f8-4db7-ba05-412ace8598e6/export"/>
    <published>2023-01-12T18:30:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d999923-827e-4343-8a7f-2bd730b83797/export</id>
    <title>7d999923-827e-4343-8a7f-2bd730b83797</title>
    <updated>2026-05-06T10:57:38.625516+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d999923-827e-4343-8a7f-2bd730b83797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46371", "type": "seen", "source": "https://t.me/cibsecurity/56433", "content": "\u203c CVE-2022-46371 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Information disclosure. Unspecified error message contains the default administrator user name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d999923-827e-4343-8a7f-2bd730b83797/export"/>
    <published>2023-01-12T18:30:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1a4b04a5-42f7-4237-bfec-5ac82aa7e9de/export</id>
    <title>1a4b04a5-42f7-4237-bfec-5ac82aa7e9de</title>
    <updated>2026-05-06T10:57:38.625421+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1a4b04a5-42f7-4237-bfec-5ac82aa7e9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46372", "type": "seen", "source": "https://t.me/cibsecurity/56434", "content": "\u203c CVE-2022-46372 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Command execution Improper validation of unspecified input field may allow Authenticated command execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1a4b04a5-42f7-4237-bfec-5ac82aa7e9de/export"/>
    <published>2023-01-12T18:30:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ae1382f-7edf-4527-a57e-2bab606387a6/export</id>
    <title>4ae1382f-7edf-4527-a57e-2bab606387a6</title>
    <updated>2026-05-06T10:57:38.625300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ae1382f-7edf-4527-a57e-2bab606387a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46378", "type": "seen", "source": "https://t.me/cibsecurity/63813", "content": "\u203c CVE-2022-46378 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T20:19:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ae1382f-7edf-4527-a57e-2bab606387a6/export"/>
    <published>2023-05-10T20:19:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/49741547-5425-493c-a1ee-1994c3e6af75/export</id>
    <title>49741547-5425-493c-a1ee-1994c3e6af75</title>
    <updated>2026-05-06T10:57:38.622749+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "49741547-5425-493c-a1ee-1994c3e6af75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46377", "type": "seen", "source": "https://t.me/cibsecurity/63803", "content": "\u203c CVE-2022-46377 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-29T20:48:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/49741547-5425-493c-a1ee-1994c3e6af75/export"/>
    <published>2023-05-29T20:48:54+00:00</published>
  </entry>
</feed>
