<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:35:51 +0000</lastBuildDate>
    <item>
      <title>e53b4978-7666-437b-a890-1f207b562424</title>
      <link>https://vulnerability.circl.lu/sighting/e53b4978-7666-437b-a890-1f207b562424/export</link>
      <description>{"uuid": "e53b4978-7666-437b-a890-1f207b562424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29539", "type": "seen", "source": "https://t.me/cibsecurity/42488", "content": "\u203c CVE-2022-29539 \u203c\n\nresi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&amp;amp;|;\\r\\ commands) and inject arbitrary system commands with the privileges of the application user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T18:36:04.000000Z"}</description>
      <content:encoded>{"uuid": "e53b4978-7666-437b-a890-1f207b562424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29539", "type": "seen", "source": "https://t.me/cibsecurity/42488", "content": "\u203c CVE-2022-29539 \u203c\n\nresi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&amp;amp;|;\\r\\ commands) and inject arbitrary system commands with the privileges of the application user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T18:36:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e53b4978-7666-437b-a890-1f207b562424/export</guid>
      <pubDate>Thu, 12 May 2022 18:36:04 +0000</pubDate>
    </item>
  </channel>
</rss>
