<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:14:35 +0000</lastBuildDate>
    <item>
      <title>1a86e781-5a51-4081-a43e-51928e6cc52b</title>
      <link>https://vulnerability.circl.lu/sighting/1a86e781-5a51-4081-a43e-51928e6cc52b/export</link>
      <description>{"uuid": "1a86e781-5a51-4081-a43e-51928e6cc52b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35925", "type": "seen", "source": "https://t.me/cibsecurity/47441", "content": "\u203c CVE-2022-35925 \u203c\n\nBookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-03T00:17:57.000000Z"}</description>
      <content:encoded>{"uuid": "1a86e781-5a51-4081-a43e-51928e6cc52b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35925", "type": "seen", "source": "https://t.me/cibsecurity/47441", "content": "\u203c CVE-2022-35925 \u203c\n\nBookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-03T00:17:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1a86e781-5a51-4081-a43e-51928e6cc52b/export</guid>
      <pubDate>Wed, 03 Aug 2022 00:17:57 +0000</pubDate>
    </item>
  </channel>
</rss>
