<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:01:18 +0000</lastBuildDate>
    <item>
      <title>79ace0e8-7d5f-4473-a2e8-a5879b7dac3b</title>
      <link>https://vulnerability.circl.lu/sighting/79ace0e8-7d5f-4473-a2e8-a5879b7dac3b/export</link>
      <description>{"uuid": "79ace0e8-7d5f-4473-a2e8-a5879b7dac3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2012-2629", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/18886", "content": "", "creation_timestamp": "2012-05-16T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "79ace0e8-7d5f-4473-a2e8-a5879b7dac3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2012-2629", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/18886", "content": "", "creation_timestamp": "2012-05-16T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/79ace0e8-7d5f-4473-a2e8-a5879b7dac3b/export</guid>
      <pubDate>Wed, 16 May 2012 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>3eac5bec-133e-4e52-9504-6d10304bb44a</title>
      <link>https://vulnerability.circl.lu/sighting/3eac5bec-133e-4e52-9504-6d10304bb44a/export</link>
      <description>{"uuid": "3eac5bec-133e-4e52-9504-6d10304bb44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-2629", "type": "seen", "source": "https://t.me/cibsecurity/9949", "content": "ATENTION\u203c New - CVE-2012-2629\n\nMultiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-02-20T07:52:03.000000Z"}</description>
      <content:encoded>{"uuid": "3eac5bec-133e-4e52-9504-6d10304bb44a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-2629", "type": "seen", "source": "https://t.me/cibsecurity/9949", "content": "ATENTION\u203c New - CVE-2012-2629\n\nMultiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-02-20T07:52:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3eac5bec-133e-4e52-9504-6d10304bb44a/export</guid>
      <pubDate>Thu, 20 Feb 2020 07:52:03 +0000</pubDate>
    </item>
  </channel>
</rss>
