<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T00:18:46.456892+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b82fbf44-f39a-420c-8833-a97225f10712/export</id>
    <title>b82fbf44-f39a-420c-8833-a97225f10712</title>
    <updated>2026-05-09T00:18:46.782455+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b82fbf44-f39a-420c-8833-a97225f10712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30000", "type": "seen", "source": "https://t.me/cibsecurity/42526", "content": "\u203c CVE-2022-30000 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editPayment.php?recipt_no=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b82fbf44-f39a-420c-8833-a97225f10712/export"/>
    <published>2022-05-12T20:42:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de512b08-f759-448e-912e-47081c6ebdcf/export</id>
    <title>de512b08-f759-448e-912e-47081c6ebdcf</title>
    <updated>2026-05-09T00:18:46.782355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de512b08-f759-448e-912e-47081c6ebdcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30002", "type": "seen", "source": "https://t.me/cibsecurity/42529", "content": "\u203c CVE-2022-30002 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editNominee.php?nominee_id=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de512b08-f759-448e-912e-47081c6ebdcf/export"/>
    <published>2022-05-12T20:42:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da5a2cc9-d6be-4632-8168-a6f9cbe6018d/export</id>
    <title>da5a2cc9-d6be-4632-8168-a6f9cbe6018d</title>
    <updated>2026-05-09T00:18:46.782254+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da5a2cc9-d6be-4632-8168-a6f9cbe6018d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30006", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1a[Reserved for CVE-2022-30006]\nURL\uff1ahttps://github.com/ComparedArray/printix-CVE-2022-30006\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-16T16:20:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da5a2cc9-d6be-4632-8168-a6f9cbe6018d/export"/>
    <published>2022-05-16T16:20:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export</id>
    <title>2e03ae3a-4942-4ce4-9cb8-37c620aeeec7</title>
    <updated>2026-05-09T00:18:46.782150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e03ae3a-4942-4ce4-9cb8-37c620aeeec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30007", "type": "seen", "source": "https://t.me/cibsecurity/42838", "content": "\u203c CVE-2022-30007 \u203c\n\nGXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T20:27:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export"/>
    <published>2022-05-17T20:27:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aaf2dd90-22c0-40b7-a9eb-59bc1be96daa/export</id>
    <title>aaf2dd90-22c0-40b7-a9eb-59bc1be96daa</title>
    <updated>2026-05-09T00:18:46.782041+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aaf2dd90-22c0-40b7-a9eb-59bc1be96daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3000", "type": "seen", "source": "https://t.me/cibsecurity/50129", "content": "\u203c CVE-2022-3000 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T12:39:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aaf2dd90-22c0-40b7-a9eb-59bc1be96daa/export"/>
    <published>2022-09-20T12:39:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7764ba47-4642-42a5-9395-e7798a572b58/export</id>
    <title>7764ba47-4642-42a5-9395-e7798a572b58</title>
    <updated>2026-05-09T00:18:46.781854+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7764ba47-4642-42a5-9395-e7798a572b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30003", "type": "seen", "source": "https://t.me/cibsecurity/50524", "content": "\u203c CVE-2022-30003 \u203c\n\nSourcecodester Online Market Place Site 1.0 is vulnerable to Cross Site Scripting (XSS), allowing attackers to register as a Seller then create new products containing XSS payloads in the 'Product Title' and 'Short Description' fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T22:22:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7764ba47-4642-42a5-9395-e7798a572b58/export"/>
    <published>2022-09-26T22:22:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2bff8ee3-7232-46cc-89d9-488a719f4f3c/export</id>
    <title>2bff8ee3-7232-46cc-89d9-488a719f4f3c</title>
    <updated>2026-05-09T00:18:46.778361+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2bff8ee3-7232-46cc-89d9-488a719f4f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-30004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Sourcecodester Online Market Place Site v1.0 suffers from an unauthenticated blind SQL Injection Vulnerability allowing remote attackers to dump the SQL database via time-based SQL injection..\n\ud83d\udccf Published: 2022-09-26T19:16:39.000Z\n\ud83d\udccf Modified: 2025-05-21T18:33:44.418Z\n\ud83d\udd17 References:\n1. https://www.sourcecodester.com/php/15273/online-market-place-site-phpoop-free-source-code.html\n2. https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html", "creation_timestamp": "2025-05-21T18:43:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2bff8ee3-7232-46cc-89d9-488a719f4f3c/export"/>
    <published>2025-05-21T18:43:18+00:00</published>
  </entry>
</feed>
