<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T07:48:03.528443+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/dc292935-d164-4624-84f3-b3e1a082760b/export</id>
    <title>dc292935-d164-4624-84f3-b3e1a082760b</title>
    <updated>2026-05-17T07:48:03.918405+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dc292935-d164-4624-84f3-b3e1a082760b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36785", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-36785\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: \nD-Link \u2013 G integrated Access Device4 Information Disclosure &amp;amp; Authorization Bypass.\n*Information Disclosure \u2013 \nfile contains a URL with private IP at line 15 \"login.asp\" A. The\nwindow.location.href = http://192.168.1.1/setupWizard.asp\" http://192.168.1.1/setupWizard.asp\" ;\n\"admin\" \u2013 contains default username value \"login.asp\" B. While accessing the web interface, the login form at \n\n*Authorization Bypass \u2013 \nURL by \"setupWizard.asp' while it blocks direct access to \u2013 the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a \"login_glag\" and \"login_status\" checking browser and to read the admin user credentials for the web interface.\n\n\n\n\n\ud83d\udccf Published: 2022-11-17T22:27:55.842Z\n\ud83d\udccf Modified: 2025-04-29T13:43:47.629Z\n\ud83d\udd17 References:\n1. https://www.gov.il/en/Departments/faq/cve_advisories", "creation_timestamp": "2025-04-29T14:11:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dc292935-d164-4624-84f3-b3e1a082760b/export"/>
    <published>2025-04-29T14:11:55+00:00</published>
  </entry>
</feed>
