<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 00:18:33 +0000</lastBuildDate>
    <item>
      <title>b82fbf44-f39a-420c-8833-a97225f10712</title>
      <link>https://vulnerability.circl.lu/sighting/b82fbf44-f39a-420c-8833-a97225f10712/export</link>
      <description>{"uuid": "b82fbf44-f39a-420c-8833-a97225f10712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30000", "type": "seen", "source": "https://t.me/cibsecurity/42526", "content": "\u203c CVE-2022-30000 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editPayment.php?recipt_no=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:13.000000Z"}</description>
      <content:encoded>{"uuid": "b82fbf44-f39a-420c-8833-a97225f10712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30000", "type": "seen", "source": "https://t.me/cibsecurity/42526", "content": "\u203c CVE-2022-30000 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editPayment.php?recipt_no=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b82fbf44-f39a-420c-8833-a97225f10712/export</guid>
      <pubDate>Thu, 12 May 2022 20:42:13 +0000</pubDate>
    </item>
    <item>
      <title>de512b08-f759-448e-912e-47081c6ebdcf</title>
      <link>https://vulnerability.circl.lu/sighting/de512b08-f759-448e-912e-47081c6ebdcf/export</link>
      <description>{"uuid": "de512b08-f759-448e-912e-47081c6ebdcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30002", "type": "seen", "source": "https://t.me/cibsecurity/42529", "content": "\u203c CVE-2022-30002 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editNominee.php?nominee_id=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:17.000000Z"}</description>
      <content:encoded>{"uuid": "de512b08-f759-448e-912e-47081c6ebdcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30002", "type": "seen", "source": "https://t.me/cibsecurity/42529", "content": "\u203c CVE-2022-30002 \u203c\n\nInsurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editNominee.php?nominee_id=.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:42:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/de512b08-f759-448e-912e-47081c6ebdcf/export</guid>
      <pubDate>Thu, 12 May 2022 20:42:17 +0000</pubDate>
    </item>
    <item>
      <title>da5a2cc9-d6be-4632-8168-a6f9cbe6018d</title>
      <link>https://vulnerability.circl.lu/sighting/da5a2cc9-d6be-4632-8168-a6f9cbe6018d/export</link>
      <description>{"uuid": "da5a2cc9-d6be-4632-8168-a6f9cbe6018d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30006", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1a[Reserved for CVE-2022-30006]\nURL\uff1ahttps://github.com/ComparedArray/printix-CVE-2022-30006\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-16T16:20:52.000000Z"}</description>
      <content:encoded>{"uuid": "da5a2cc9-d6be-4632-8168-a6f9cbe6018d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30006", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1a[Reserved for CVE-2022-30006]\nURL\uff1ahttps://github.com/ComparedArray/printix-CVE-2022-30006\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-16T16:20:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/da5a2cc9-d6be-4632-8168-a6f9cbe6018d/export</guid>
      <pubDate>Mon, 16 May 2022 16:20:52 +0000</pubDate>
    </item>
    <item>
      <title>2e03ae3a-4942-4ce4-9cb8-37c620aeeec7</title>
      <link>https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export</link>
      <description>{"uuid": "2e03ae3a-4942-4ce4-9cb8-37c620aeeec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30007", "type": "seen", "source": "https://t.me/cibsecurity/42838", "content": "\u203c CVE-2022-30007 \u203c\n\nGXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T20:27:48.000000Z"}</description>
      <content:encoded>{"uuid": "2e03ae3a-4942-4ce4-9cb8-37c620aeeec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30007", "type": "seen", "source": "https://t.me/cibsecurity/42838", "content": "\u203c CVE-2022-30007 \u203c\n\nGXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T20:27:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2e03ae3a-4942-4ce4-9cb8-37c620aeeec7/export</guid>
      <pubDate>Tue, 17 May 2022 20:27:48 +0000</pubDate>
    </item>
    <item>
      <title>aaf2dd90-22c0-40b7-a9eb-59bc1be96daa</title>
      <link>https://vulnerability.circl.lu/sighting/aaf2dd90-22c0-40b7-a9eb-59bc1be96daa/export</link>
      <description>{"uuid": "aaf2dd90-22c0-40b7-a9eb-59bc1be96daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3000", "type": "seen", "source": "https://t.me/cibsecurity/50129", "content": "\u203c CVE-2022-3000 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T12:39:08.000000Z"}</description>
      <content:encoded>{"uuid": "aaf2dd90-22c0-40b7-a9eb-59bc1be96daa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3000", "type": "seen", "source": "https://t.me/cibsecurity/50129", "content": "\u203c CVE-2022-3000 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T12:39:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aaf2dd90-22c0-40b7-a9eb-59bc1be96daa/export</guid>
      <pubDate>Tue, 20 Sep 2022 12:39:08 +0000</pubDate>
    </item>
    <item>
      <title>7764ba47-4642-42a5-9395-e7798a572b58</title>
      <link>https://vulnerability.circl.lu/sighting/7764ba47-4642-42a5-9395-e7798a572b58/export</link>
      <description>{"uuid": "7764ba47-4642-42a5-9395-e7798a572b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30003", "type": "seen", "source": "https://t.me/cibsecurity/50524", "content": "\u203c CVE-2022-30003 \u203c\n\nSourcecodester Online Market Place Site 1.0 is vulnerable to Cross Site Scripting (XSS), allowing attackers to register as a Seller then create new products containing XSS payloads in the 'Product Title' and 'Short Description' fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T22:22:45.000000Z"}</description>
      <content:encoded>{"uuid": "7764ba47-4642-42a5-9395-e7798a572b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30003", "type": "seen", "source": "https://t.me/cibsecurity/50524", "content": "\u203c CVE-2022-30003 \u203c\n\nSourcecodester Online Market Place Site 1.0 is vulnerable to Cross Site Scripting (XSS), allowing attackers to register as a Seller then create new products containing XSS payloads in the 'Product Title' and 'Short Description' fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T22:22:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7764ba47-4642-42a5-9395-e7798a572b58/export</guid>
      <pubDate>Mon, 26 Sep 2022 22:22:45 +0000</pubDate>
    </item>
    <item>
      <title>2bff8ee3-7232-46cc-89d9-488a719f4f3c</title>
      <link>https://vulnerability.circl.lu/sighting/2bff8ee3-7232-46cc-89d9-488a719f4f3c/export</link>
      <description>{"uuid": "2bff8ee3-7232-46cc-89d9-488a719f4f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-30004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Sourcecodester Online Market Place Site v1.0 suffers from an unauthenticated blind SQL Injection Vulnerability allowing remote attackers to dump the SQL database via time-based SQL injection..\n\ud83d\udccf Published: 2022-09-26T19:16:39.000Z\n\ud83d\udccf Modified: 2025-05-21T18:33:44.418Z\n\ud83d\udd17 References:\n1. https://www.sourcecodester.com/php/15273/online-market-place-site-phpoop-free-source-code.html\n2. https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html", "creation_timestamp": "2025-05-21T18:43:18.000000Z"}</description>
      <content:encoded>{"uuid": "2bff8ee3-7232-46cc-89d9-488a719f4f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30004", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-30004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Sourcecodester Online Market Place Site v1.0 suffers from an unauthenticated blind SQL Injection Vulnerability allowing remote attackers to dump the SQL database via time-based SQL injection..\n\ud83d\udccf Published: 2022-09-26T19:16:39.000Z\n\ud83d\udccf Modified: 2025-05-21T18:33:44.418Z\n\ud83d\udd17 References:\n1. https://www.sourcecodester.com/php/15273/online-market-place-site-phpoop-free-source-code.html\n2. https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html", "creation_timestamp": "2025-05-21T18:43:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2bff8ee3-7232-46cc-89d9-488a719f4f3c/export</guid>
      <pubDate>Wed, 21 May 2025 18:43:18 +0000</pubDate>
    </item>
  </channel>
</rss>
