<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:37:36 +0000</lastBuildDate>
    <item>
      <title>56129ed0-8d87-4e44-a6bb-5f6c43bf2937</title>
      <link>https://vulnerability.circl.lu/sighting/56129ed0-8d87-4e44-a6bb-5f6c43bf2937/export</link>
      <description>{"uuid": "56129ed0-8d87-4e44-a6bb-5f6c43bf2937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28556", "type": "seen", "source": "https://t.me/cibsecurity/41942", "content": "\u203c CVE-2022-28556 \u203c\n\nTenda AC15 US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin is vulnerable to Buffer Overflow. The stack overflow vulnerability lies in the /goform/setpptpservercfg interface of the web. The sent post data startip and endip are copied to the stack using the sanf function, resulting in stack overflow. Similarly, this vulnerability can be used together with CVE-2021-44971\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T20:35:33.000000Z"}</description>
      <content:encoded>{"uuid": "56129ed0-8d87-4e44-a6bb-5f6c43bf2937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28556", "type": "seen", "source": "https://t.me/cibsecurity/41942", "content": "\u203c CVE-2022-28556 \u203c\n\nTenda AC15 US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin is vulnerable to Buffer Overflow. The stack overflow vulnerability lies in the /goform/setpptpservercfg interface of the web. The sent post data startip and endip are copied to the stack using the sanf function, resulting in stack overflow. Similarly, this vulnerability can be used together with CVE-2021-44971\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T20:35:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/56129ed0-8d87-4e44-a6bb-5f6c43bf2937/export</guid>
      <pubDate>Wed, 04 May 2022 20:35:33 +0000</pubDate>
    </item>
  </channel>
</rss>
