<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:40:06 +0000</lastBuildDate>
    <item>
      <title>b7ca2c39-31e3-4b1f-b6d6-504e926a21ef</title>
      <link>https://vulnerability.circl.lu/sighting/b7ca2c39-31e3-4b1f-b6d6-504e926a21ef/export</link>
      <description>{"uuid": "b7ca2c39-31e3-4b1f-b6d6-504e926a21ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44720", "type": "seen", "source": "https://t.me/cibsecurity/65757", "content": "\u203c CVE-2022-44720 \u203c\n\nAn issue was discovered in Weblib Ucopia before 6.0.13. OS Command Injection injection can occur, related to chroot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T00:14:32.000000Z"}</description>
      <content:encoded>{"uuid": "b7ca2c39-31e3-4b1f-b6d6-504e926a21ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44720", "type": "seen", "source": "https://t.me/cibsecurity/65757", "content": "\u203c CVE-2022-44720 \u203c\n\nAn issue was discovered in Weblib Ucopia before 6.0.13. OS Command Injection injection can occur, related to chroot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T00:14:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7ca2c39-31e3-4b1f-b6d6-504e926a21ef/export</guid>
      <pubDate>Fri, 30 Jun 2023 00:14:32 +0000</pubDate>
    </item>
    <item>
      <title>e79809d1-2279-48de-a5c2-36af3b193c5f</title>
      <link>https://vulnerability.circl.lu/sighting/e79809d1-2279-48de-a5c2-36af3b193c5f/export</link>
      <description>{"uuid": "e79809d1-2279-48de-a5c2-36af3b193c5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181518", "content": "https://ift.tt/fNevGix\nCVE-2022-44729 | Oracle Financial Services Revenue Management and Billing up to 6.0.0 Infrastructure server-side request forgery", "creation_timestamp": "2024-02-08T18:17:11.000000Z"}</description>
      <content:encoded>{"uuid": "e79809d1-2279-48de-a5c2-36af3b193c5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181518", "content": "https://ift.tt/fNevGix\nCVE-2022-44729 | Oracle Financial Services Revenue Management and Billing up to 6.0.0 Infrastructure server-side request forgery", "creation_timestamp": "2024-02-08T18:17:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e79809d1-2279-48de-a5c2-36af3b193c5f/export</guid>
      <pubDate>Thu, 08 Feb 2024 18:17:11 +0000</pubDate>
    </item>
    <item>
      <title>527d24fe-d08d-4354-bd0c-2a30672b2518</title>
      <link>https://vulnerability.circl.lu/sighting/527d24fe-d08d-4354-bd0c-2a30672b2518/export</link>
      <description>{"uuid": "527d24fe-d08d-4354-bd0c-2a30672b2518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181874", "content": "https://ift.tt/m8yclQH\nCVE-2022-44729 | Oracle Business Process Management Suite 12.2.1.4.0 BPM Composer server-side request forgery", "creation_timestamp": "2024-02-09T08:51:16.000000Z"}</description>
      <content:encoded>{"uuid": "527d24fe-d08d-4354-bd0c-2a30672b2518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181874", "content": "https://ift.tt/m8yclQH\nCVE-2022-44729 | Oracle Business Process Management Suite 12.2.1.4.0 BPM Composer server-side request forgery", "creation_timestamp": "2024-02-09T08:51:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/527d24fe-d08d-4354-bd0c-2a30672b2518/export</guid>
      <pubDate>Fri, 09 Feb 2024 08:51:16 +0000</pubDate>
    </item>
    <item>
      <title>0e599485-4fae-4e72-98be-273b7f11b71d</title>
      <link>https://vulnerability.circl.lu/sighting/0e599485-4fae-4e72-98be-273b7f11b71d/export</link>
      <description>{"uuid": "0e599485-4fae-4e72-98be-273b7f11b71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181981", "content": "https://ift.tt/lYBJ6s8\nCVE-2022-44729 | Oracle Business Intelligence Enterprise Edition 6.4.0.0.0/7.0.0.0.0/12.2.1.4.0 Presentation Services unknown vulnerability", "creation_timestamp": "2024-02-09T12:21:18.000000Z"}</description>
      <content:encoded>{"uuid": "0e599485-4fae-4e72-98be-273b7f11b71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/181981", "content": "https://ift.tt/lYBJ6s8\nCVE-2022-44729 | Oracle Business Intelligence Enterprise Edition 6.4.0.0.0/7.0.0.0.0/12.2.1.4.0 Presentation Services unknown vulnerability", "creation_timestamp": "2024-02-09T12:21:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0e599485-4fae-4e72-98be-273b7f11b71d/export</guid>
      <pubDate>Fri, 09 Feb 2024 12:21:18 +0000</pubDate>
    </item>
    <item>
      <title>d236d36f-5dbb-42a9-b4dd-8604da9f1db3</title>
      <link>https://vulnerability.circl.lu/sighting/d236d36f-5dbb-42a9-b4dd-8604da9f1db3/export</link>
      <description>{"uuid": "d236d36f-5dbb-42a9-b4dd-8604da9f1db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/182065", "content": "https://ift.tt/0DCSv9j\nCVE-2022-44729 | Oracle Hyperion Financial Reporting 11.2.14.0.000 Installation server-side request forgery", "creation_timestamp": "2024-02-09T15:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "d236d36f-5dbb-42a9-b4dd-8604da9f1db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://t.me/ctinow/182065", "content": "https://ift.tt/0DCSv9j\nCVE-2022-44729 | Oracle Hyperion Financial Reporting 11.2.14.0.000 Installation server-side request forgery", "creation_timestamp": "2024-02-09T15:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d236d36f-5dbb-42a9-b4dd-8604da9f1db3/export</guid>
      <pubDate>Fri, 09 Feb 2024 15:26:53 +0000</pubDate>
    </item>
    <item>
      <title>0db6e02b-0c36-42a0-bf31-00ac3a2e372e</title>
      <link>https://vulnerability.circl.lu/sighting/0db6e02b-0c36-42a0-bf31-00ac3a2e372e/export</link>
      <description>{"uuid": "0db6e02b-0c36-42a0-bf31-00ac3a2e372e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4472", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9356", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4472\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Simple Sitemap WordPress plugin before 3.5.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.\n\ud83d\udccf Published: 2023-01-30T20:31:35.144Z\n\ud83d\udccf Modified: 2025-03-28T14:05:14.424Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a", "creation_timestamp": "2025-03-28T14:27:41.000000Z"}</description>
      <content:encoded>{"uuid": "0db6e02b-0c36-42a0-bf31-00ac3a2e372e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4472", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9356", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4472\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Simple Sitemap WordPress plugin before 3.5.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.\n\ud83d\udccf Published: 2023-01-30T20:31:35.144Z\n\ud83d\udccf Modified: 2025-03-28T14:05:14.424Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a", "creation_timestamp": "2025-03-28T14:27:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0db6e02b-0c36-42a0-bf31-00ac3a2e372e/export</guid>
      <pubDate>Fri, 28 Mar 2025 14:27:41 +0000</pubDate>
    </item>
    <item>
      <title>400a8cca-1eb9-4221-ada9-06a644b9cfe2</title>
      <link>https://vulnerability.circl.lu/sighting/400a8cca-1eb9-4221-ada9-06a644b9cfe2/export</link>
      <description>{"uuid": "400a8cca-1eb9-4221-ada9-06a644b9cfe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44725", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44725\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).\n\ud83d\udccf Published: 2022-11-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:47:56.883Z\n\ud83d\udd17 References:\n1. https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/\n2. https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf", "creation_timestamp": "2025-04-29T15:11:53.000000Z"}</description>
      <content:encoded>{"uuid": "400a8cca-1eb9-4221-ada9-06a644b9cfe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44725", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44725\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).\n\ud83d\udccf Published: 2022-11-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:47:56.883Z\n\ud83d\udd17 References:\n1. https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/\n2. https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf", "creation_timestamp": "2025-04-29T15:11:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/400a8cca-1eb9-4221-ada9-06a644b9cfe2/export</guid>
      <pubDate>Tue, 29 Apr 2025 15:11:53 +0000</pubDate>
    </item>
    <item>
      <title>458e60d3-6dc9-43e1-bd25-4877d0cb92d9</title>
      <link>https://vulnerability.circl.lu/sighting/458e60d3-6dc9-43e1-bd25-4877d0cb92d9/export</link>
      <description>{"uuid": "458e60d3-6dc9-43e1-bd25-4877d0cb92d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44727\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The EU Cookie Law GDPR (Banner + Blocker) module before 2.1.3 for PrestaShop allows SQL Injection via a cookie ( lgcookieslaw or __lglaw ).\n\ud83d\udccf Published: 2022-11-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T14:01:49.423Z\n\ud83d\udd17 References:\n1. https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf\n2. https://addons.prestashop.com/en/legal/8734-eu-cookie-law-gdpr-banner-blocker.html\n3. https://securityandstuff.com/posts/cve-2022-44727/", "creation_timestamp": "2025-05-01T14:15:21.000000Z"}</description>
      <content:encoded>{"uuid": "458e60d3-6dc9-43e1-bd25-4877d0cb92d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44727\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The EU Cookie Law GDPR (Banner + Blocker) module before 2.1.3 for PrestaShop allows SQL Injection via a cookie ( lgcookieslaw or __lglaw ).\n\ud83d\udccf Published: 2022-11-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T14:01:49.423Z\n\ud83d\udd17 References:\n1. https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf\n2. https://addons.prestashop.com/en/legal/8734-eu-cookie-law-gdpr-banner-blocker.html\n3. https://securityandstuff.com/posts/cve-2022-44727/", "creation_timestamp": "2025-05-01T14:15:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/458e60d3-6dc9-43e1-bd25-4877d0cb92d9/export</guid>
      <pubDate>Thu, 01 May 2025 14:15:21 +0000</pubDate>
    </item>
    <item>
      <title>46f42b76-2a68-44e5-a909-e87899015aeb</title>
      <link>https://vulnerability.circl.lu/sighting/46f42b76-2a68-44e5-a909-e87899015aeb/export</link>
      <description>{"uuid": "46f42b76-2a68-44e5-a909-e87899015aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-04", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "46f42b76-2a68-44e5-a909-e87899015aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-04", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/46f42b76-2a68-44e5-a909-e87899015aeb/export</guid>
      <pubDate>Thu, 18 Sep 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>2c216208-7521-4aa8-a78a-9c0511de9aff</title>
      <link>https://vulnerability.circl.lu/sighting/2c216208-7521-4aa8-a78a-9c0511de9aff/export</link>
      <description>{"uuid": "2c216208-7521-4aa8-a78a-9c0511de9aff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://gist.github.com/Darkcrai86/0f80603a263e033f4c0501a6394db4b8", "content": "", "creation_timestamp": "2025-09-18T16:28:01.000000Z"}</description>
      <content:encoded>{"uuid": "2c216208-7521-4aa8-a78a-9c0511de9aff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://gist.github.com/Darkcrai86/0f80603a263e033f4c0501a6394db4b8", "content": "", "creation_timestamp": "2025-09-18T16:28:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2c216208-7521-4aa8-a78a-9c0511de9aff/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:28:01 +0000</pubDate>
    </item>
  </channel>
</rss>
