<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:29:35 +0000</lastBuildDate>
    <item>
      <title>e4d4ec50-6fe2-4aa3-8c78-f4617982cd77</title>
      <link>https://vulnerability.circl.lu/sighting/e4d4ec50-6fe2-4aa3-8c78-f4617982cd77/export</link>
      <description>{"uuid": "e4d4ec50-6fe2-4aa3-8c78-f4617982cd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41699", "type": "seen", "source": "https://t.me/cibsecurity/63758", "content": "\u203c CVE-2022-41699 \u203c\n\nIncorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:19:44.000000Z"}</description>
      <content:encoded>{"uuid": "e4d4ec50-6fe2-4aa3-8c78-f4617982cd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41699", "type": "seen", "source": "https://t.me/cibsecurity/63758", "content": "\u203c CVE-2022-41699 \u203c\n\nIncorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:19:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e4d4ec50-6fe2-4aa3-8c78-f4617982cd77/export</guid>
      <pubDate>Wed, 10 May 2023 18:19:44 +0000</pubDate>
    </item>
    <item>
      <title>cdb2b30f-e373-470f-89be-0b705fe131b2</title>
      <link>https://vulnerability.circl.lu/sighting/cdb2b30f-e373-470f-89be-0b705fe131b2/export</link>
      <description>{"uuid": "cdb2b30f-e373-470f-89be-0b705fe131b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/ctinow/169397", "content": "https://ift.tt/b1zQpDC\nCVE-2022-41695", "creation_timestamp": "2024-01-17T18:26:57.000000Z"}</description>
      <content:encoded>{"uuid": "cdb2b30f-e373-470f-89be-0b705fe131b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/ctinow/169397", "content": "https://ift.tt/b1zQpDC\nCVE-2022-41695", "creation_timestamp": "2024-01-17T18:26:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cdb2b30f-e373-470f-89be-0b705fe131b2/export</guid>
      <pubDate>Wed, 17 Jan 2024 18:26:57 +0000</pubDate>
    </item>
    <item>
      <title>f07a51bf-ec66-4e73-a349-6a8b70ae7c1a</title>
      <link>https://vulnerability.circl.lu/sighting/f07a51bf-ec66-4e73-a349-6a8b70ae7c1a/export</link>
      <description>{"uuid": "f07a51bf-ec66-4e73-a349-6a8b70ae7c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/ctinow/182653", "content": "https://ift.tt/ahwjGY4\nCVE-2022-41695 | SedLex Traffic Manager Plugin up to 1.4.5 on WordPress authorization", "creation_timestamp": "2024-02-10T22:46:34.000000Z"}</description>
      <content:encoded>{"uuid": "f07a51bf-ec66-4e73-a349-6a8b70ae7c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/ctinow/182653", "content": "https://ift.tt/ahwjGY4\nCVE-2022-41695 | SedLex Traffic Manager Plugin up to 1.4.5 on WordPress authorization", "creation_timestamp": "2024-02-10T22:46:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f07a51bf-ec66-4e73-a349-6a8b70ae7c1a/export</guid>
      <pubDate>Sat, 10 Feb 2024 22:46:34 +0000</pubDate>
    </item>
    <item>
      <title>b0d92cef-38f6-433a-a0c6-d70d46a0c274</title>
      <link>https://vulnerability.circl.lu/sighting/b0d92cef-38f6-433a-a0c6-d70d46a0c274/export</link>
      <description>{"uuid": "b0d92cef-38f6-433a-a0c6-d70d46a0c274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2245", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41696\n\ud83d\udd39 Description: Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\ud83d\udccf Published: 2023-03-21T22:19:30.671Z\n\ud83d\udccf Modified: 2025-01-17T22:07:09.782Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05", "creation_timestamp": "2025-01-17T22:57:13.000000Z"}</description>
      <content:encoded>{"uuid": "b0d92cef-38f6-433a-a0c6-d70d46a0c274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2245", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41696\n\ud83d\udd39 Description: Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\ud83d\udccf Published: 2023-03-21T22:19:30.671Z\n\ud83d\udccf Modified: 2025-01-17T22:07:09.782Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05", "creation_timestamp": "2025-01-17T22:57:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b0d92cef-38f6-433a-a0c6-d70d46a0c274/export</guid>
      <pubDate>Fri, 17 Jan 2025 22:57:13 +0000</pubDate>
    </item>
    <item>
      <title>d3635b8c-9c26-47d0-b5fe-c6caeb730541</title>
      <link>https://vulnerability.circl.lu/sighting/d3635b8c-9c26-47d0-b5fe-c6caeb730541/export</link>
      <description>{"uuid": "d3635b8c-9c26-47d0-b5fe-c6caeb730541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41699", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2974", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41699\n\ud83d\udd39 Description: Incorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2023-05-10T13:17:16.651Z\n\ud83d\udccf Modified: 2025-01-24T17:37:49.035Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html", "creation_timestamp": "2025-01-24T18:05:24.000000Z"}</description>
      <content:encoded>{"uuid": "d3635b8c-9c26-47d0-b5fe-c6caeb730541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41699", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2974", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41699\n\ud83d\udd39 Description: Incorrect permission assignment for critical resource in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2023-05-10T13:17:16.651Z\n\ud83d\udccf Modified: 2025-01-24T17:37:49.035Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html", "creation_timestamp": "2025-01-24T18:05:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d3635b8c-9c26-47d0-b5fe-c6caeb730541/export</guid>
      <pubDate>Fri, 24 Jan 2025 18:05:24 +0000</pubDate>
    </item>
    <item>
      <title>cd2210ed-8dc0-455e-8815-538661057664</title>
      <link>https://vulnerability.circl.lu/sighting/cd2210ed-8dc0-455e-8815-538661057664/export</link>
      <description>{"uuid": "cd2210ed-8dc0-455e-8815-538661057664", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41691", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15565", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41691\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: When a BIG-IP Advanced WAF/ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.\n\ud83d\udccf Published: 2022-10-19T21:19:45.651Z\n\ud83d\udccf Modified: 2025-05-08T18:13:02.493Z\n\ud83d\udd17 References:\n1. https://support.f5.com/csp/article/K02694732", "creation_timestamp": "2025-05-08T18:24:05.000000Z"}</description>
      <content:encoded>{"uuid": "cd2210ed-8dc0-455e-8815-538661057664", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41691", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15565", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41691\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: When a BIG-IP Advanced WAF/ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.\n\ud83d\udccf Published: 2022-10-19T21:19:45.651Z\n\ud83d\udccf Modified: 2025-05-08T18:13:02.493Z\n\ud83d\udd17 References:\n1. https://support.f5.com/csp/article/K02694732", "creation_timestamp": "2025-05-08T18:24:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd2210ed-8dc0-455e-8815-538661057664/export</guid>
      <pubDate>Thu, 08 May 2025 18:24:05 +0000</pubDate>
    </item>
    <item>
      <title>e7173ca3-fb08-4b2a-9dfe-7c0a9f79686e</title>
      <link>https://vulnerability.circl.lu/sighting/e7173ca3-fb08-4b2a-9dfe-7c0a9f79686e/export</link>
      <description>{"uuid": "e7173ca3-fb08-4b2a-9dfe-7c0a9f79686e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41694", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15566", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41694\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In BIG-IP versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, and BIG-IQ versions 8.x before 8.2.0.1 and all versions of 7.x, when an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause MCPD to terminate.\n\ud83d\udccf Published: 2022-10-19T21:20:06.272Z\n\ud83d\udccf Modified: 2025-05-08T18:12:35.198Z\n\ud83d\udd17 References:\n1. https://support.f5.com/csp/article/K64829234", "creation_timestamp": "2025-05-08T18:24:06.000000Z"}</description>
      <content:encoded>{"uuid": "e7173ca3-fb08-4b2a-9dfe-7c0a9f79686e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41694", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15566", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41694\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In BIG-IP versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, and BIG-IQ versions 8.x before 8.2.0.1 and all versions of 7.x, when an SSL key is imported on a BIG-IP or BIG-IQ system, undisclosed input can cause MCPD to terminate.\n\ud83d\udccf Published: 2022-10-19T21:20:06.272Z\n\ud83d\udccf Modified: 2025-05-08T18:12:35.198Z\n\ud83d\udd17 References:\n1. https://support.f5.com/csp/article/K64829234", "creation_timestamp": "2025-05-08T18:24:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e7173ca3-fb08-4b2a-9dfe-7c0a9f79686e/export</guid>
      <pubDate>Thu, 08 May 2025 18:24:06 +0000</pubDate>
    </item>
    <item>
      <title>b9bc051b-8379-41d2-8b56-6e9aade84b9a</title>
      <link>https://vulnerability.circl.lu/sighting/b9bc051b-8379-41d2-8b56-6e9aade84b9a/export</link>
      <description>{"uuid": "b9bc051b-8379-41d2-8b56-6e9aade84b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18609", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41695\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in SedLex Traffic Manager.This issue affects Traffic Manager: from n/a through 1.4.5.\n\n\n\ud83d\udccf Published: 2024-01-17T17:09:02.699Z\n\ud83d\udccf Modified: 2025-06-17T14:18:32.381Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/traffic-manager/wordpress-traffic-manager-plugin-1-4-5-multiple-vulnerabilities?_s_id=cve", "creation_timestamp": "2025-06-17T14:40:20.000000Z"}</description>
      <content:encoded>{"uuid": "b9bc051b-8379-41d2-8b56-6e9aade84b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41695", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18609", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41695\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in SedLex Traffic Manager.This issue affects Traffic Manager: from n/a through 1.4.5.\n\n\n\ud83d\udccf Published: 2024-01-17T17:09:02.699Z\n\ud83d\udccf Modified: 2025-06-17T14:18:32.381Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/traffic-manager/wordpress-traffic-manager-plugin-1-4-5-multiple-vulnerabilities?_s_id=cve", "creation_timestamp": "2025-06-17T14:40:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9bc051b-8379-41d2-8b56-6e9aade84b9a/export</guid>
      <pubDate>Tue, 17 Jun 2025 14:40:20 +0000</pubDate>
    </item>
    <item>
      <title>869f20a3-da56-4962-a20b-a695e30119db</title>
      <link>https://vulnerability.circl.lu/sighting/869f20a3-da56-4962-a20b-a695e30119db/export</link>
      <description>{"uuid": "869f20a3-da56-4962-a20b-a695e30119db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41697", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2022/CVE-2022-41697.yaml", "content": "", "creation_timestamp": "2026-01-20T14:01:28.000000Z"}</description>
      <content:encoded>{"uuid": "869f20a3-da56-4962-a20b-a695e30119db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41697", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2022/CVE-2022-41697.yaml", "content": "", "creation_timestamp": "2026-01-20T14:01:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/869f20a3-da56-4962-a20b-a695e30119db/export</guid>
      <pubDate>Tue, 20 Jan 2026 14:01:28 +0000</pubDate>
    </item>
    <item>
      <title>0418ab5f-8626-4fab-9e76-035361f85494</title>
      <link>https://vulnerability.circl.lu/sighting/0418ab5f-8626-4fab-9e76-035361f85494/export</link>
      <description>{"uuid": "0418ab5f-8626-4fab-9e76-035361f85494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41697", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mcxkzuljox24", "content": "", "creation_timestamp": "2026-01-21T21:03:00.810677Z"}</description>
      <content:encoded>{"uuid": "0418ab5f-8626-4fab-9e76-035361f85494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41697", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mcxkzuljox24", "content": "", "creation_timestamp": "2026-01-21T21:03:00.810677Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0418ab5f-8626-4fab-9e76-035361f85494/export</guid>
      <pubDate>Wed, 21 Jan 2026 21:03:00 +0000</pubDate>
    </item>
  </channel>
</rss>
