<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:38:28 +0000</lastBuildDate>
    <item>
      <title>5c92301b-ee2f-457b-8651-e40af10c9513</title>
      <link>https://vulnerability.circl.lu/sighting/5c92301b-ee2f-457b-8651-e40af10c9513/export</link>
      <description>{"uuid": "5c92301b-ee2f-457b-8651-e40af10c9513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4637", "type": "seen", "source": "https://t.me/cibsecurity/55090", "content": "\u203c CVE-2022-4637 \u203c\n\nA vulnerability classified as problematic has been found in ep3-bs 1.8.0. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.1 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-22T00:13:08.000000Z"}</description>
      <content:encoded>{"uuid": "5c92301b-ee2f-457b-8651-e40af10c9513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4637", "type": "seen", "source": "https://t.me/cibsecurity/55090", "content": "\u203c CVE-2022-4637 \u203c\n\nA vulnerability classified as problematic has been found in ep3-bs 1.8.0. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.1 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-22T00:13:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5c92301b-ee2f-457b-8651-e40af10c9513/export</guid>
      <pubDate>Thu, 22 Dec 2022 00:13:08 +0000</pubDate>
    </item>
    <item>
      <title>ba60fdfc-72f8-4db7-ba05-412ace8598e6</title>
      <link>https://vulnerability.circl.lu/sighting/ba60fdfc-72f8-4db7-ba05-412ace8598e6/export</link>
      <description>{"uuid": "ba60fdfc-72f8-4db7-ba05-412ace8598e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46370", "type": "seen", "source": "https://t.me/cibsecurity/56428", "content": "\u203c CVE-2022-46370 \u203c\n\nRumpus - FTP server version 9.0.7.1 Improper Token Verification\u00e2\u20ac\u201c vulnerability may allow bypassing identity verification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:28.000000Z"}</description>
      <content:encoded>{"uuid": "ba60fdfc-72f8-4db7-ba05-412ace8598e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46370", "type": "seen", "source": "https://t.me/cibsecurity/56428", "content": "\u203c CVE-2022-46370 \u203c\n\nRumpus - FTP server version 9.0.7.1 Improper Token Verification\u00e2\u20ac\u201c vulnerability may allow bypassing identity verification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ba60fdfc-72f8-4db7-ba05-412ace8598e6/export</guid>
      <pubDate>Thu, 12 Jan 2023 18:30:28 +0000</pubDate>
    </item>
    <item>
      <title>7d999923-827e-4343-8a7f-2bd730b83797</title>
      <link>https://vulnerability.circl.lu/sighting/7d999923-827e-4343-8a7f-2bd730b83797/export</link>
      <description>{"uuid": "7d999923-827e-4343-8a7f-2bd730b83797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46371", "type": "seen", "source": "https://t.me/cibsecurity/56433", "content": "\u203c CVE-2022-46371 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Information disclosure. Unspecified error message contains the default administrator user name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:36.000000Z"}</description>
      <content:encoded>{"uuid": "7d999923-827e-4343-8a7f-2bd730b83797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46371", "type": "seen", "source": "https://t.me/cibsecurity/56433", "content": "\u203c CVE-2022-46371 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Information disclosure. Unspecified error message contains the default administrator user name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7d999923-827e-4343-8a7f-2bd730b83797/export</guid>
      <pubDate>Thu, 12 Jan 2023 18:30:36 +0000</pubDate>
    </item>
    <item>
      <title>1a4b04a5-42f7-4237-bfec-5ac82aa7e9de</title>
      <link>https://vulnerability.circl.lu/sighting/1a4b04a5-42f7-4237-bfec-5ac82aa7e9de/export</link>
      <description>{"uuid": "1a4b04a5-42f7-4237-bfec-5ac82aa7e9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46372", "type": "seen", "source": "https://t.me/cibsecurity/56434", "content": "\u203c CVE-2022-46372 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Command execution Improper validation of unspecified input field may allow Authenticated command execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:37.000000Z"}</description>
      <content:encoded>{"uuid": "1a4b04a5-42f7-4237-bfec-5ac82aa7e9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46372", "type": "seen", "source": "https://t.me/cibsecurity/56434", "content": "\u203c CVE-2022-46372 \u203c\n\nAlotcer - AR7088H-A firmware version 16.10.3 Command execution Improper validation of unspecified input field may allow Authenticated command execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T18:30:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1a4b04a5-42f7-4237-bfec-5ac82aa7e9de/export</guid>
      <pubDate>Thu, 12 Jan 2023 18:30:37 +0000</pubDate>
    </item>
    <item>
      <title>4ae1382f-7edf-4527-a57e-2bab606387a6</title>
      <link>https://vulnerability.circl.lu/sighting/4ae1382f-7edf-4527-a57e-2bab606387a6/export</link>
      <description>{"uuid": "4ae1382f-7edf-4527-a57e-2bab606387a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46378", "type": "seen", "source": "https://t.me/cibsecurity/63813", "content": "\u203c CVE-2022-46378 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T20:19:51.000000Z"}</description>
      <content:encoded>{"uuid": "4ae1382f-7edf-4527-a57e-2bab606387a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46378", "type": "seen", "source": "https://t.me/cibsecurity/63813", "content": "\u203c CVE-2022-46378 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T20:19:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ae1382f-7edf-4527-a57e-2bab606387a6/export</guid>
      <pubDate>Wed, 10 May 2023 20:19:51 +0000</pubDate>
    </item>
    <item>
      <title>49741547-5425-493c-a1ee-1994c3e6af75</title>
      <link>https://vulnerability.circl.lu/sighting/49741547-5425-493c-a1ee-1994c3e6af75/export</link>
      <description>{"uuid": "49741547-5425-493c-a1ee-1994c3e6af75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46377", "type": "seen", "source": "https://t.me/cibsecurity/63803", "content": "\u203c CVE-2022-46377 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-29T20:48:54.000000Z"}</description>
      <content:encoded>{"uuid": "49741547-5425-493c-a1ee-1994c3e6af75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46377", "type": "seen", "source": "https://t.me/cibsecurity/63803", "content": "\u203c CVE-2022-46377 \u203c\n\nAn out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-29T20:48:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/49741547-5425-493c-a1ee-1994c3e6af75/export</guid>
      <pubDate>Mon, 29 May 2023 20:48:54 +0000</pubDate>
    </item>
  </channel>
</rss>
