<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 02:08:47 +0000</lastBuildDate>
    <item>
      <title>416db537-6e64-4c4f-ad6d-70c7e6d05732</title>
      <link>https://vulnerability.circl.lu/sighting/416db537-6e64-4c4f-ad6d-70c7e6d05732/export</link>
      <description>{"uuid": "416db537-6e64-4c4f-ad6d-70c7e6d05732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44003", "type": "seen", "source": "https://t.me/cibsecurity/53055", "content": "\u203c CVE-2022-44003 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:01:53.000000Z"}</description>
      <content:encoded>{"uuid": "416db537-6e64-4c4f-ad6d-70c7e6d05732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44003", "type": "seen", "source": "https://t.me/cibsecurity/53055", "content": "\u203c CVE-2022-44003 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:01:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/416db537-6e64-4c4f-ad6d-70c7e6d05732/export</guid>
      <pubDate>Thu, 17 Nov 2022 16:01:53 +0000</pubDate>
    </item>
    <item>
      <title>04a8c1b9-745e-4a4f-99fd-cad16de41575</title>
      <link>https://vulnerability.circl.lu/sighting/04a8c1b9-745e-4a4f-99fd-cad16de41575/export</link>
      <description>{"uuid": "04a8c1b9-745e-4a4f-99fd-cad16de41575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44005", "type": "seen", "source": "https://t.me/cibsecurity/53056", "content": "\u203c CVE-2022-44005 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:01:54.000000Z"}</description>
      <content:encoded>{"uuid": "04a8c1b9-745e-4a4f-99fd-cad16de41575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44005", "type": "seen", "source": "https://t.me/cibsecurity/53056", "content": "\u203c CVE-2022-44005 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-17T16:01:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04a8c1b9-745e-4a4f-99fd-cad16de41575/export</guid>
      <pubDate>Thu, 17 Nov 2022 16:01:54 +0000</pubDate>
    </item>
    <item>
      <title>13ea6e1b-7e00-4473-881a-9a047bada057</title>
      <link>https://vulnerability.circl.lu/sighting/13ea6e1b-7e00-4473-881a-9a047bada057/export</link>
      <description>{"uuid": "13ea6e1b-7e00-4473-881a-9a047bada057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44001", "type": "seen", "source": "https://t.me/cibsecurity/53107", "content": "\u203c CVE-2022-44001 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-18T00:17:57.000000Z"}</description>
      <content:encoded>{"uuid": "13ea6e1b-7e00-4473-881a-9a047bada057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44001", "type": "seen", "source": "https://t.me/cibsecurity/53107", "content": "\u203c CVE-2022-44001 \u203c\n\nAn issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-18T00:17:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13ea6e1b-7e00-4473-881a-9a047bada057/export</guid>
      <pubDate>Fri, 18 Nov 2022 00:17:57 +0000</pubDate>
    </item>
    <item>
      <title>29d9e83d-0cf3-4f82-9bcb-57b89127cbe0</title>
      <link>https://vulnerability.circl.lu/sighting/29d9e83d-0cf3-4f82-9bcb-57b89127cbe0/export</link>
      <description>{"uuid": "29d9e83d-0cf3-4f82-9bcb-57b89127cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4400", "type": "seen", "source": "https://t.me/cibsecurity/54259", "content": "\u203c CVE-2022-4400 \u203c\n\nA vulnerability was found in zbl1996 FS-Blog and classified as problematic. This issue affects some unknown processing of the component Title Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-215267.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-11T12:19:54.000000Z"}</description>
      <content:encoded>{"uuid": "29d9e83d-0cf3-4f82-9bcb-57b89127cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4400", "type": "seen", "source": "https://t.me/cibsecurity/54259", "content": "\u203c CVE-2022-4400 \u203c\n\nA vulnerability was found in zbl1996 FS-Blog and classified as problematic. This issue affects some unknown processing of the component Title Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-215267.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-11T12:19:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/29d9e83d-0cf3-4f82-9bcb-57b89127cbe0/export</guid>
      <pubDate>Sun, 11 Dec 2022 12:19:54 +0000</pubDate>
    </item>
    <item>
      <title>46e6e64c-6a86-45df-b150-77793cb656ae</title>
      <link>https://vulnerability.circl.lu/sighting/46e6e64c-6a86-45df-b150-77793cb656ae/export</link>
      <description>{"uuid": "46e6e64c-6a86-45df-b150-77793cb656ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44009\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper access control in Key-Value RBAC in StackStorm version 3.7.0 didn't check the permissions in Jinja filters, allowing attackers to access K/V pairs of other users, potentially leading to the exposure of sensitive Information.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:56:33.601Z\n\ud83d\udd17 References:\n1. https://stackstorm.com/2022/12/v3-8-0-released/", "creation_timestamp": "2025-04-24T14:05:43.000000Z"}</description>
      <content:encoded>{"uuid": "46e6e64c-6a86-45df-b150-77793cb656ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44009\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper access control in Key-Value RBAC in StackStorm version 3.7.0 didn't check the permissions in Jinja filters, allowing attackers to access K/V pairs of other users, potentially leading to the exposure of sensitive Information.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T13:56:33.601Z\n\ud83d\udd17 References:\n1. https://stackstorm.com/2022/12/v3-8-0-released/", "creation_timestamp": "2025-04-24T14:05:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/46e6e64c-6a86-45df-b150-77793cb656ae/export</guid>
      <pubDate>Thu, 24 Apr 2025 14:05:43 +0000</pubDate>
    </item>
    <item>
      <title>b2967e89-b0f9-4817-8b35-7b6d9be87c75</title>
      <link>https://vulnerability.circl.lu/sighting/b2967e89-b0f9-4817-8b35-7b6d9be87c75/export</link>
      <description>{"uuid": "b2967e89-b0f9-4817-8b35-7b6d9be87c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44001", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44001\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.\n\ud83d\udccf Published: 2022-11-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:56:45.457Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt", "creation_timestamp": "2025-04-29T15:11:42.000000Z"}</description>
      <content:encoded>{"uuid": "b2967e89-b0f9-4817-8b35-7b6d9be87c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44001", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44001\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.\n\ud83d\udccf Published: 2022-11-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:56:45.457Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt", "creation_timestamp": "2025-04-29T15:11:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b2967e89-b0f9-4817-8b35-7b6d9be87c75/export</guid>
      <pubDate>Tue, 29 Apr 2025 15:11:42 +0000</pubDate>
    </item>
    <item>
      <title>f0572e63-2c1f-44e8-81c4-372cbac59aa8</title>
      <link>https://vulnerability.circl.lu/sighting/f0572e63-2c1f-44e8-81c4-372cbac59aa8/export</link>
      <description>{"uuid": "f0572e63-2c1f-44e8-81c4-372cbac59aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44007", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13933", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44007\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to an unsafe implementation of session tracking, it is possible for an attacker to trick users into opening an authenticated user session for a session identifier known to the attacker, aka Session Fixation.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T20:31:25.154Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt", "creation_timestamp": "2025-04-29T21:13:39.000000Z"}</description>
      <content:encoded>{"uuid": "f0572e63-2c1f-44e8-81c4-372cbac59aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44007", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13933", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44007\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to an unsafe implementation of session tracking, it is possible for an attacker to trick users into opening an authenticated user session for a session identifier known to the attacker, aka Session Fixation.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T20:31:25.154Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt", "creation_timestamp": "2025-04-29T21:13:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f0572e63-2c1f-44e8-81c4-372cbac59aa8/export</guid>
      <pubDate>Tue, 29 Apr 2025 21:13:39 +0000</pubDate>
    </item>
    <item>
      <title>cc7da92b-aef2-4473-8718-54b1323eab33</title>
      <link>https://vulnerability.circl.lu/sighting/cc7da92b-aef2-4473-8718-54b1323eab33/export</link>
      <description>{"uuid": "cc7da92b-aef2-4473-8718-54b1323eab33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44003", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44003\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:03:40.514Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt", "creation_timestamp": "2025-04-30T14:13:02.000000Z"}</description>
      <content:encoded>{"uuid": "cc7da92b-aef2-4473-8718-54b1323eab33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44003", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44003\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:03:40.514Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt", "creation_timestamp": "2025-04-30T14:13:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc7da92b-aef2-4473-8718-54b1323eab33/export</guid>
      <pubDate>Wed, 30 Apr 2025 14:13:02 +0000</pubDate>
    </item>
    <item>
      <title>1e4055e7-dee1-4772-9046-a321286b44d8</title>
      <link>https://vulnerability.circl.lu/sighting/1e4055e7-dee1-4772-9046-a321286b44d8/export</link>
      <description>{"uuid": "1e4055e7-dee1-4772-9046-a321286b44d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to insecure design or lack of authentication, unauthenticated attackers can complete the password-reset process for any account and set a new password.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:02:19.648Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt", "creation_timestamp": "2025-04-30T14:13:03.000000Z"}</description>
      <content:encoded>{"uuid": "1e4055e7-dee1-4772-9046-a321286b44d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to insecure design or lack of authentication, unauthenticated attackers can complete the password-reset process for any account and set a new password.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:02:19.648Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt", "creation_timestamp": "2025-04-30T14:13:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1e4055e7-dee1-4772-9046-a321286b44d8/export</guid>
      <pubDate>Wed, 30 Apr 2025 14:13:03 +0000</pubDate>
    </item>
    <item>
      <title>22a73f30-1850-40d4-97a0-61c28580e475</title>
      <link>https://vulnerability.circl.lu/sighting/22a73f30-1850-40d4-97a0-61c28580e475/export</link>
      <description>{"uuid": "22a73f30-1850-40d4-97a0-61c28580e475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44005", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14038", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44005\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:00:49.152Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt", "creation_timestamp": "2025-04-30T14:13:04.000000Z"}</description>
      <content:encoded>{"uuid": "22a73f30-1850-40d4-97a0-61c28580e475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44005", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14038", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44005\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent.\n\ud83d\udccf Published: 2022-11-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T14:00:49.152Z\n\ud83d\udd17 References:\n1. https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037\n2. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt", "creation_timestamp": "2025-04-30T14:13:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/22a73f30-1850-40d4-97a0-61c28580e475/export</guid>
      <pubDate>Wed, 30 Apr 2025 14:13:04 +0000</pubDate>
    </item>
  </channel>
</rss>
