<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:55:37 +0000</lastBuildDate>
    <item>
      <title>ca0d7a5b-45e2-408d-9767-ea3877db9c88</title>
      <link>https://vulnerability.circl.lu/sighting/ca0d7a5b-45e2-408d-9767-ea3877db9c88/export</link>
      <description>{"uuid": "ca0d7a5b-45e2-408d-9767-ea3877db9c88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24131", "type": "seen", "source": "https://t.me/cibsecurity/39807", "content": "\u203c CVE-2022-24131 \u203c\n\nDouPHP v1.6 Release 20220121 is affected by Cross Site Scripting (XSS) through /admin/login.php in the background, which will lead to JavaScript code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T16:12:21.000000Z"}</description>
      <content:encoded>{"uuid": "ca0d7a5b-45e2-408d-9767-ea3877db9c88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24131", "type": "seen", "source": "https://t.me/cibsecurity/39807", "content": "\u203c CVE-2022-24131 \u203c\n\nDouPHP v1.6 Release 20220121 is affected by Cross Site Scripting (XSS) through /admin/login.php in the background, which will lead to JavaScript code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T16:12:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca0d7a5b-45e2-408d-9767-ea3877db9c88/export</guid>
      <pubDate>Wed, 30 Mar 2022 16:12:21 +0000</pubDate>
    </item>
    <item>
      <title>245973b5-c9fc-476d-84bd-b85a6e4059d8</title>
      <link>https://vulnerability.circl.lu/sighting/245973b5-c9fc-476d-84bd-b85a6e4059d8/export</link>
      <description>{"uuid": "245973b5-c9fc-476d-84bd-b85a6e4059d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24135", "type": "seen", "source": "https://t.me/cibsecurity/39867", "content": "\u203c CVE-2022-24135 \u203c\n\nQingScan 1.3.0 is affected by Cross Site Scripting (XSS) vulnerability in all search functions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T22:17:31.000000Z"}</description>
      <content:encoded>{"uuid": "245973b5-c9fc-476d-84bd-b85a6e4059d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24135", "type": "seen", "source": "https://t.me/cibsecurity/39867", "content": "\u203c CVE-2022-24135 \u203c\n\nQingScan 1.3.0 is affected by Cross Site Scripting (XSS) vulnerability in all search functions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T22:17:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/245973b5-c9fc-476d-84bd-b85a6e4059d8/export</guid>
      <pubDate>Wed, 30 Mar 2022 22:17:31 +0000</pubDate>
    </item>
    <item>
      <title>a54855a5-c0e0-466a-8da4-4d3085e7f392</title>
      <link>https://vulnerability.circl.lu/sighting/a54855a5-c0e0-466a-8da4-4d3085e7f392/export</link>
      <description>{"uuid": "a54855a5-c0e0-466a-8da4-4d3085e7f392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24132", "type": "seen", "source": "https://t.me/cibsecurity/39868", "content": "\u203c CVE-2022-24132 \u203c\n\nphpshe V1.8 is affected by a denial of service (DoS) attack in the registry's verification code, which can paralyze the target service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T22:17:32.000000Z"}</description>
      <content:encoded>{"uuid": "a54855a5-c0e0-466a-8da4-4d3085e7f392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24132", "type": "seen", "source": "https://t.me/cibsecurity/39868", "content": "\u203c CVE-2022-24132 \u203c\n\nphpshe V1.8 is affected by a denial of service (DoS) attack in the registry's verification code, which can paralyze the target service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T22:17:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a54855a5-c0e0-466a-8da4-4d3085e7f392/export</guid>
      <pubDate>Wed, 30 Mar 2022 22:17:32 +0000</pubDate>
    </item>
    <item>
      <title>23b5b101-d0db-4519-8a71-9fb7e4769f89</title>
      <link>https://vulnerability.circl.lu/sighting/23b5b101-d0db-4519-8a71-9fb7e4769f89/export</link>
      <description>{"uuid": "23b5b101-d0db-4519-8a71-9fb7e4769f89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24136", "type": "seen", "source": "https://t.me/cibsecurity/39908", "content": "\u203c CVE-2022-24136 \u203c\n\nHospital Management System v1.0 is affected by an unrestricted upload of dangerous file type vulerability in treatmentrecord.php. To exploit, an attacker can upload any PHP file, and then execute it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T14:18:25.000000Z"}</description>
      <content:encoded>{"uuid": "23b5b101-d0db-4519-8a71-9fb7e4769f89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24136", "type": "seen", "source": "https://t.me/cibsecurity/39908", "content": "\u203c CVE-2022-24136 \u203c\n\nHospital Management System v1.0 is affected by an unrestricted upload of dangerous file type vulerability in treatmentrecord.php. To exploit, an attacker can upload any PHP file, and then execute it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T14:18:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/23b5b101-d0db-4519-8a71-9fb7e4769f89/export</guid>
      <pubDate>Thu, 31 Mar 2022 14:18:25 +0000</pubDate>
    </item>
    <item>
      <title>727dfd77-dc16-47b2-a1af-d5a5cf2e9eb6</title>
      <link>https://vulnerability.circl.lu/sighting/727dfd77-dc16-47b2-a1af-d5a5cf2e9eb6/export</link>
      <description>{"uuid": "727dfd77-dc16-47b2-a1af-d5a5cf2e9eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24138", "type": "seen", "source": "https://t.me/cibsecurity/45639", "content": "\u203c CVE-2022-24138 \u203c\n\nIOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has \"rwx\" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -&amp;gt; high integrity ADMIN).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T16:20:45.000000Z"}</description>
      <content:encoded>{"uuid": "727dfd77-dc16-47b2-a1af-d5a5cf2e9eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24138", "type": "seen", "source": "https://t.me/cibsecurity/45639", "content": "\u203c CVE-2022-24138 \u203c\n\nIOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has \"rwx\" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -&amp;gt; high integrity ADMIN).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T16:20:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/727dfd77-dc16-47b2-a1af-d5a5cf2e9eb6/export</guid>
      <pubDate>Wed, 06 Jul 2022 16:20:45 +0000</pubDate>
    </item>
    <item>
      <title>f616c195-77f7-4724-8bda-b8e839af353e</title>
      <link>https://vulnerability.circl.lu/sighting/f616c195-77f7-4724-8bda-b8e839af353e/export</link>
      <description>{"uuid": "f616c195-77f7-4724-8bda-b8e839af353e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24139", "type": "seen", "source": "https://t.me/cibsecurity/45642", "content": "\u203c CVE-2022-24139 \u203c\n\nIn IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -&amp;gt; SYSTEM or from Local ADMIN-&amp;gt; Domain ADMIN depending on the user and named pipe that is used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T16:20:47.000000Z"}</description>
      <content:encoded>{"uuid": "f616c195-77f7-4724-8bda-b8e839af353e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24139", "type": "seen", "source": "https://t.me/cibsecurity/45642", "content": "\u203c CVE-2022-24139 \u203c\n\nIn IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -&amp;gt; SYSTEM or from Local ADMIN-&amp;gt; Domain ADMIN depending on the user and named pipe that is used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T16:20:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f616c195-77f7-4724-8bda-b8e839af353e/export</guid>
      <pubDate>Wed, 06 Jul 2022 16:20:47 +0000</pubDate>
    </item>
    <item>
      <title>5e20acc3-b8c0-4dbb-87af-bc7e10405b04</title>
      <link>https://vulnerability.circl.lu/sighting/5e20acc3-b8c0-4dbb-87af-bc7e10405b04/export</link>
      <description>{"uuid": "5e20acc3-b8c0-4dbb-87af-bc7e10405b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2413", "type": "seen", "source": "https://t.me/ctinow/173001", "content": "https://ift.tt/U0F7aZd\nCVE-2022-2413 Exploit", "creation_timestamp": "2024-01-24T19:16:30.000000Z"}</description>
      <content:encoded>{"uuid": "5e20acc3-b8c0-4dbb-87af-bc7e10405b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2413", "type": "seen", "source": "https://t.me/ctinow/173001", "content": "https://ift.tt/U0F7aZd\nCVE-2022-2413 Exploit", "creation_timestamp": "2024-01-24T19:16:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5e20acc3-b8c0-4dbb-87af-bc7e10405b04/export</guid>
      <pubDate>Wed, 24 Jan 2024 19:16:30 +0000</pubDate>
    </item>
    <item>
      <title>a5911767-e1df-4187-ac95-fcf6eec1ff4e</title>
      <link>https://vulnerability.circl.lu/sighting/a5911767-e1df-4187-ac95-fcf6eec1ff4e/export</link>
      <description>{"uuid": "a5911767-e1df-4187-ac95-fcf6eec1ff4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2413", "type": "seen", "source": "https://t.me/ctinow/180044", "content": "https://ift.tt/53hXYGb\nCVE-2022-2413 | simonpedge Slide Anything Plugin up to 2.3.46 on WordPress cross site scripting", "creation_timestamp": "2024-02-06T15:17:15.000000Z"}</description>
      <content:encoded>{"uuid": "a5911767-e1df-4187-ac95-fcf6eec1ff4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2413", "type": "seen", "source": "https://t.me/ctinow/180044", "content": "https://ift.tt/53hXYGb\nCVE-2022-2413 | simonpedge Slide Anything Plugin up to 2.3.46 on WordPress cross site scripting", "creation_timestamp": "2024-02-06T15:17:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5911767-e1df-4187-ac95-fcf6eec1ff4e/export</guid>
      <pubDate>Tue, 06 Feb 2024 15:17:15 +0000</pubDate>
    </item>
  </channel>
</rss>
