<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 19:17:34 +0000</lastBuildDate>
    <item>
      <title>6b2f7060-090d-4b08-89bc-399d7d1c482f</title>
      <link>https://vulnerability.circl.lu/sighting/6b2f7060-090d-4b08-89bc-399d7d1c482f/export</link>
      <description>{"uuid": "6b2f7060-090d-4b08-89bc-399d7d1c482f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40226", "type": "seen", "source": "https://t.me/cibsecurity/51103", "content": "\u203c CVE-2022-40226 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T14:25:52.000000Z"}</description>
      <content:encoded>{"uuid": "6b2f7060-090d-4b08-89bc-399d7d1c482f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40226", "type": "seen", "source": "https://t.me/cibsecurity/51103", "content": "\u203c CVE-2022-40226 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P850 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10), SICAM P855 (All versions &amp;lt; V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T14:25:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6b2f7060-090d-4b08-89bc-399d7d1c482f/export</guid>
      <pubDate>Tue, 11 Oct 2022 14:25:52 +0000</pubDate>
    </item>
    <item>
      <title>01668756-d00c-4809-811b-ea7639765f32</title>
      <link>https://vulnerability.circl.lu/sighting/01668756-d00c-4809-811b-ea7639765f32/export</link>
      <description>{"uuid": "01668756-d00c-4809-811b-ea7639765f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40223", "type": "seen", "source": "https://t.me/cibsecurity/52664", "content": "\u203c CVE-2022-40223 \u203c\n\nNonce token leakage and missing authorization in SearchWP premium plugin &amp;lt;= 4.2.5 on WordPress leading to plugin settings change.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T23:18:38.000000Z"}</description>
      <content:encoded>{"uuid": "01668756-d00c-4809-811b-ea7639765f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40223", "type": "seen", "source": "https://t.me/cibsecurity/52664", "content": "\u203c CVE-2022-40223 \u203c\n\nNonce token leakage and missing authorization in SearchWP premium plugin &amp;lt;= 4.2.5 on WordPress leading to plugin settings change.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T23:18:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01668756-d00c-4809-811b-ea7639765f32/export</guid>
      <pubDate>Tue, 08 Nov 2022 23:18:38 +0000</pubDate>
    </item>
    <item>
      <title>97341b2d-9f81-4638-a88f-656a2c8e2fa1</title>
      <link>https://vulnerability.circl.lu/sighting/97341b2d-9f81-4638-a88f-656a2c8e2fa1/export</link>
      <description>{"uuid": "97341b2d-9f81-4638-a88f-656a2c8e2fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4022", "type": "seen", "source": "https://t.me/cibsecurity/53060", "content": "\u203c CVE-2022-4022 \u203c\n\nThe SVG Support plugin for WordPress defaults to insecure settings in version 2.5 and 2.5.1. SVG files containing malicious javascript are not sanitized. While version 2.5 adds the ability to sanitize image as they are uploaded, the plugin defaults to disable sanitization and does not restrict SVG upload to only administrators. This allows authenticated attackers, with author-level privileges and higher, to upload malicious SVG files that can be embedded in posts and pages by higher privileged users. Additionally, the embedded JavaScript is also triggered on visiting the image URL, which allows an attacker to execute malicious code in browsers visiting that URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:02:00.000000Z"}</description>
      <content:encoded>{"uuid": "97341b2d-9f81-4638-a88f-656a2c8e2fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4022", "type": "seen", "source": "https://t.me/cibsecurity/53060", "content": "\u203c CVE-2022-4022 \u203c\n\nThe SVG Support plugin for WordPress defaults to insecure settings in version 2.5 and 2.5.1. SVG files containing malicious javascript are not sanitized. While version 2.5 adds the ability to sanitize image as they are uploaded, the plugin defaults to disable sanitization and does not restrict SVG upload to only administrators. This allows authenticated attackers, with author-level privileges and higher, to upload malicious SVG files that can be embedded in posts and pages by higher privileged users. Additionally, the embedded JavaScript is also triggered on visiting the image URL, which allows an attacker to execute malicious code in browsers visiting that URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:02:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/97341b2d-9f81-4638-a88f-656a2c8e2fa1/export</guid>
      <pubDate>Thu, 17 Nov 2022 16:02:00 +0000</pubDate>
    </item>
    <item>
      <title>bf3f8c61-0a49-42ee-9930-c09806b5c22b</title>
      <link>https://vulnerability.circl.lu/sighting/bf3f8c61-0a49-42ee-9930-c09806b5c22b/export</link>
      <description>{"uuid": "bf3f8c61-0a49-42ee-9930-c09806b5c22b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40228", "type": "seen", "source": "https://t.me/cibsecurity/53370", "content": "\u203c CVE-2022-40228 \u203c\n\nIBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-22T22:13:12.000000Z"}</description>
      <content:encoded>{"uuid": "bf3f8c61-0a49-42ee-9930-c09806b5c22b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40228", "type": "seen", "source": "https://t.me/cibsecurity/53370", "content": "\u203c CVE-2022-40228 \u203c\n\nIBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-22T22:13:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bf3f8c61-0a49-42ee-9930-c09806b5c22b/export</guid>
      <pubDate>Tue, 22 Nov 2022 22:13:12 +0000</pubDate>
    </item>
    <item>
      <title>093664f8-d815-419c-a38f-70a564a068fe</title>
      <link>https://vulnerability.circl.lu/sighting/093664f8-d815-419c-a38f-70a564a068fe/export</link>
      <description>{"uuid": "093664f8-d815-419c-a38f-70a564a068fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40222", "type": "seen", "source": "https://t.me/cibsecurity/56989", "content": "\u203c CVE-2022-40222 \u203c\n\nAn OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:44:01.000000Z"}</description>
      <content:encoded>{"uuid": "093664f8-d815-419c-a38f-70a564a068fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40222", "type": "seen", "source": "https://t.me/cibsecurity/56989", "content": "\u203c CVE-2022-40222 \u203c\n\nAn OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:44:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/093664f8-d815-419c-a38f-70a564a068fe/export</guid>
      <pubDate>Fri, 27 Jan 2023 00:44:01 +0000</pubDate>
    </item>
    <item>
      <title>0ae8a614-748e-40ce-ad69-b5c5bbbe68b5</title>
      <link>https://vulnerability.circl.lu/sighting/0ae8a614-748e-40ce-ad69-b5c5bbbe68b5/export</link>
      <description>{"uuid": "0ae8a614-748e-40ce-ad69-b5c5bbbe68b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/cibsecurity/57687", "content": "\u203c CVE-2022-40224 \u203c\n\nA denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-07T20:45:24.000000Z"}</description>
      <content:encoded>{"uuid": "0ae8a614-748e-40ce-ad69-b5c5bbbe68b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/cibsecurity/57687", "content": "\u203c CVE-2022-40224 \u203c\n\nA denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-07T20:45:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0ae8a614-748e-40ce-ad69-b5c5bbbe68b5/export</guid>
      <pubDate>Tue, 07 Feb 2023 20:45:24 +0000</pubDate>
    </item>
    <item>
      <title>90c3effc-ec65-404d-b24c-13de58ca4ee6</title>
      <link>https://vulnerability.circl.lu/sighting/90c3effc-ec65-404d-b24c-13de58ca4ee6/export</link>
      <description>{"uuid": "90c3effc-ec65-404d-b24c-13de58ca4ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/ics_cert/703", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0633\u0631\u0648\u0631 \u0648\u0628 \u0633\u0641\u062a \u0627\u0641\u0632\u0627\u0631 \u0633\u0648\u0626\u06cc\u0686 \u0627\u062a\u0631\u0646\u062a Moxa SDS-3008 \n\n\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u06cc\u06a9 \u062f\u0631\u062e\u0648\u0627\u0633\u062a HTTP \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0627\u0635\u060c \u0633\u0631\u0648\u06cc\u0633 \u0631\u0627 \u0631\u062f \u06a9\u0646\u062f.\n\n BDU:2023-00550\n CVE-2022-40224\n\n \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc \u0648 \u062a\u062d\u0631\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0639\u0645\u0627\u0644 \u0634\u062f\u0647\u060c \u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\n \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc\u061b\n - \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0635\u0646\u0639\u062a\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u062f\u0631 \u0633\u0637\u062d \u0628\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648\u0628.\n\n \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\n https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-02-11T16:54:48.000000Z"}</description>
      <content:encoded>{"uuid": "90c3effc-ec65-404d-b24c-13de58ca4ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/ics_cert/703", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0633\u0631\u0648\u0631 \u0648\u0628 \u0633\u0641\u062a \u0627\u0641\u0632\u0627\u0631 \u0633\u0648\u0626\u06cc\u0686 \u0627\u062a\u0631\u0646\u062a Moxa SDS-3008 \n\n\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u06cc\u06a9 \u062f\u0631\u062e\u0648\u0627\u0633\u062a HTTP \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0627\u0635\u060c \u0633\u0631\u0648\u06cc\u0633 \u0631\u0627 \u0631\u062f \u06a9\u0646\u062f.\n\n BDU:2023-00550\n CVE-2022-40224\n\n \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc \u0648 \u062a\u062d\u0631\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0639\u0645\u0627\u0644 \u0634\u062f\u0647\u060c \u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\n \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc\u061b\n - \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0635\u0646\u0639\u062a\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u062f\u0631 \u0633\u0637\u062d \u0628\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648\u0628.\n\n \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\n https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-02-11T16:54:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/90c3effc-ec65-404d-b24c-13de58ca4ee6/export</guid>
      <pubDate>Sat, 11 Feb 2023 16:54:48 +0000</pubDate>
    </item>
    <item>
      <title>82d7cac0-6303-47e0-986d-e939e289b324</title>
      <link>https://vulnerability.circl.lu/sighting/82d7cac0-6303-47e0-986d-e939e289b324/export</link>
      <description>{"uuid": "82d7cac0-6303-47e0-986d-e939e289b324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6599", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40224\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2023-02-07T16:52:03.607Z\n\ud83d\udccf Modified: 2025-03-05T19:27:11.797Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618\n2. https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities", "creation_timestamp": "2025-03-05T20:01:19.000000Z"}</description>
      <content:encoded>{"uuid": "82d7cac0-6303-47e0-986d-e939e289b324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40224", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6599", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40224\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2023-02-07T16:52:03.607Z\n\ud83d\udccf Modified: 2025-03-05T19:27:11.797Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618\n2. https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities", "creation_timestamp": "2025-03-05T20:01:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/82d7cac0-6303-47e0-986d-e939e289b324/export</guid>
      <pubDate>Wed, 05 Mar 2025 20:01:19 +0000</pubDate>
    </item>
    <item>
      <title>b9174be7-1440-4069-93c7-76ed42706954</title>
      <link>https://vulnerability.circl.lu/sighting/b9174be7-1440-4069-93c7-76ed42706954/export</link>
      <description>{"uuid": "b9174be7-1440-4069-93c7-76ed42706954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40220\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2023-01-26T21:24:47.750Z\n\ud83d\udccf Modified: 2025-03-28T19:22:24.288Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612", "creation_timestamp": "2025-03-28T19:28:53.000000Z"}</description>
      <content:encoded>{"uuid": "b9174be7-1440-4069-93c7-76ed42706954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40220\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.\n\ud83d\udccf Published: 2023-01-26T21:24:47.750Z\n\ud83d\udccf Modified: 2025-03-28T19:22:24.288Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612", "creation_timestamp": "2025-03-28T19:28:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9174be7-1440-4069-93c7-76ed42706954/export</guid>
      <pubDate>Fri, 28 Mar 2025 19:28:53 +0000</pubDate>
    </item>
    <item>
      <title>894b08e5-e05d-4f7f-812f-0d83bc402563</title>
      <link>https://vulnerability.circl.lu/sighting/894b08e5-e05d-4f7f-812f-0d83bc402563/export</link>
      <description>{"uuid": "894b08e5-e05d-4f7f-812f-0d83bc402563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40228", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13516", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40228\n\ud83d\udd25 CVSS Score: 3.7 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: \n\n\nIBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527.\n\n\n\ud83d\udccf Published: 2022-11-22T18:52:13.196Z\n\ud83d\udccf Modified: 2025-04-25T19:56:58.200Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6840759\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/235527", "creation_timestamp": "2025-04-25T20:07:57.000000Z"}</description>
      <content:encoded>{"uuid": "894b08e5-e05d-4f7f-812f-0d83bc402563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40228", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13516", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40228\n\ud83d\udd25 CVSS Score: 3.7 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: \n\n\nIBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527.\n\n\n\ud83d\udccf Published: 2022-11-22T18:52:13.196Z\n\ud83d\udccf Modified: 2025-04-25T19:56:58.200Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6840759\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/235527", "creation_timestamp": "2025-04-25T20:07:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/894b08e5-e05d-4f7f-812f-0d83bc402563/export</guid>
      <pubDate>Fri, 25 Apr 2025 20:07:57 +0000</pubDate>
    </item>
  </channel>
</rss>
