<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 09:47:36 +0000</lastBuildDate>
    <item>
      <title>48dc7c32-040d-49ab-9c6c-74cbcb6e8558</title>
      <link>https://vulnerability.circl.lu/sighting/48dc7c32-040d-49ab-9c6c-74cbcb6e8558/export</link>
      <description>{"uuid": "48dc7c32-040d-49ab-9c6c-74cbcb6e8558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31887", "type": "seen", "source": "https://t.me/cibsecurity/45343", "content": "\u203c CVE-2022-31887 \u203c\n\nMarval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-29T02:36:27.000000Z"}</description>
      <content:encoded>{"uuid": "48dc7c32-040d-49ab-9c6c-74cbcb6e8558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31887", "type": "seen", "source": "https://t.me/cibsecurity/45343", "content": "\u203c CVE-2022-31887 \u203c\n\nMarval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-29T02:36:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/48dc7c32-040d-49ab-9c6c-74cbcb6e8558/export</guid>
      <pubDate>Wed, 29 Jun 2022 02:36:27 +0000</pubDate>
    </item>
  </channel>
</rss>
