<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 16:33:32 +0000</lastBuildDate>
    <item>
      <title>afaef02b-d327-4cb7-a196-053501a1f54f</title>
      <link>https://vulnerability.circl.lu/sighting/afaef02b-d327-4cb7-a196-053501a1f54f/export</link>
      <description>{"uuid": "afaef02b-d327-4cb7-a196-053501a1f54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "seen", "source": "https://t.me/cibsecurity/45834", "content": "\u203c CVE-2022-35411 \u203c\n\nrpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-08T22:18:36.000000Z"}</description>
      <content:encoded>{"uuid": "afaef02b-d327-4cb7-a196-053501a1f54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "seen", "source": "https://t.me/cibsecurity/45834", "content": "\u203c CVE-2022-35411 \u203c\n\nrpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-08T22:18:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/afaef02b-d327-4cb7-a196-053501a1f54f/export</guid>
      <pubDate>Fri, 08 Jul 2022 22:18:36 +0000</pubDate>
    </item>
    <item>
      <title>6081b26f-1248-4d9b-9b86-60c1ffbcc724</title>
      <link>https://vulnerability.circl.lu/sighting/6081b26f-1248-4d9b-9b86-60c1ffbcc724/export</link>
      <description>{"uuid": "6081b26f-1248-4d9b-9b86-60c1ffbcc724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7168", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1arpc.py 0.6.0 - Remote Code Execution (RCE)\nURL\uff1ahttps://github.com/fuzzlove/CVE-2022-35411\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-04-25T11:10:21.000000Z"}</description>
      <content:encoded>{"uuid": "6081b26f-1248-4d9b-9b86-60c1ffbcc724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7168", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1arpc.py 0.6.0 - Remote Code Execution (RCE)\nURL\uff1ahttps://github.com/fuzzlove/CVE-2022-35411\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-04-25T11:10:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6081b26f-1248-4d9b-9b86-60c1ffbcc724/export</guid>
      <pubDate>Thu, 25 Apr 2024 11:10:21 +0000</pubDate>
    </item>
    <item>
      <title>23353d9f-0322-4309-a27b-bfa633b3493e</title>
      <link>https://vulnerability.circl.lu/sighting/23353d9f-0322-4309-a27b-bfa633b3493e/export</link>
      <description>{"uuid": "23353d9f-0322-4309-a27b-bfa633b3493e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45668", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit for CVE-2022-35411 \u2014 Unauthenticated RCE in rpc.py (&amp;lt;= 0.6.0)\nURL\uff1ahttps://github.com/CSpanias/rpc-rce.py\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-07-28T09:31:39.000000Z"}</description>
      <content:encoded>{"uuid": "23353d9f-0322-4309-a27b-bfa633b3493e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45668", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit for CVE-2022-35411 \u2014 Unauthenticated RCE in rpc.py (&amp;lt;= 0.6.0)\nURL\uff1ahttps://github.com/CSpanias/rpc-rce.py\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-07-28T09:31:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/23353d9f-0322-4309-a27b-bfa633b3493e/export</guid>
      <pubDate>Mon, 28 Jul 2025 09:31:39 +0000</pubDate>
    </item>
    <item>
      <title>5b8c41f6-321a-406a-b26a-0da9d12908fc</title>
      <link>https://vulnerability.circl.lu/sighting/5b8c41f6-321a-406a-b26a-0da9d12908fc/export</link>
      <description>{"uuid": "5b8c41f6-321a-406a-b26a-0da9d12908fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "Telegram/Fl_ltFZIbiQsMNPTYivk2KXEOFXqbKjLz4yAp3sglbIHJYU", "content": "", "creation_timestamp": "2025-07-28T15:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "5b8c41f6-321a-406a-b26a-0da9d12908fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35411", "type": "published-proof-of-concept", "source": "Telegram/Fl_ltFZIbiQsMNPTYivk2KXEOFXqbKjLz4yAp3sglbIHJYU", "content": "", "creation_timestamp": "2025-07-28T15:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b8c41f6-321a-406a-b26a-0da9d12908fc/export</guid>
      <pubDate>Mon, 28 Jul 2025 15:00:06 +0000</pubDate>
    </item>
  </channel>
</rss>
