<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 09:02:40 +0000</lastBuildDate>
    <item>
      <title>3cda41b2-7c0a-464d-99af-905d829e33a4</title>
      <link>https://db.gcve.eu/sighting/3cda41b2-7c0a-464d-99af-905d829e33a4/export</link>
      <description>{"uuid": "3cda41b2-7c0a-464d-99af-905d829e33a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38550", "type": "seen", "source": "https://t.me/cibsecurity/50101", "content": "\u203c CVE-2022-38550 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T02:38:21.000000Z"}</description>
      <content:encoded>{"uuid": "3cda41b2-7c0a-464d-99af-905d829e33a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38550", "type": "seen", "source": "https://t.me/cibsecurity/50101", "content": "\u203c CVE-2022-38550 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T02:38:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3cda41b2-7c0a-464d-99af-905d829e33a4/export</guid>
      <pubDate>Tue, 20 Sep 2022 02:38:21 +0000</pubDate>
    </item>
    <item>
      <title>4d979db4-f518-4269-950c-a9c59b62880f</title>
      <link>https://db.gcve.eu/sighting/4d979db4-f518-4269-950c-a9c59b62880f/export</link>
      <description>{"uuid": "4d979db4-f518-4269-950c-a9c59b62880f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "seen", "source": "https://t.me/cibsecurity/50463", "content": "\u203c CVE-2022-38553 \u203c\n\nAcademy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T14:22:29.000000Z"}</description>
      <content:encoded>{"uuid": "4d979db4-f518-4269-950c-a9c59b62880f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "seen", "source": "https://t.me/cibsecurity/50463", "content": "\u203c CVE-2022-38553 \u203c\n\nAcademy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T14:22:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4d979db4-f518-4269-950c-a9c59b62880f/export</guid>
      <pubDate>Mon, 26 Sep 2022 14:22:29 +0000</pubDate>
    </item>
    <item>
      <title>40a0e84d-f01d-4701-90e1-89e85f78aef7</title>
      <link>https://db.gcve.eu/sighting/40a0e84d-f01d-4701-90e1-89e85f78aef7/export</link>
      <description>{"uuid": "40a0e84d-f01d-4701-90e1-89e85f78aef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/310", "content": "Now here are the cve of linksys and Tp-Link equipment\n\nFor those who do not know linksys is a manufacturer of networking equipment for small offices and homes. They make network hubs, routers, and network cards. \n\nFor example, linksys' managed switches include features for rapid network expansion. The STP and Storm Control protocol features help control planned or unintended cable loops linksys help protect the network with port authentication which requires clients to authenticate themselves before they start working, clients must authenticate themselves before transmitting any data. \nSo what are the vulnerabilities of this equipment ?\n\nHere are some cve \nFor example, there is CVE-2022-38555 it is a buffer overflow vulnerability in Linksys E1200 already has a poc  or CVE-2020-35713 remote pre-authentication code execution in Linksys RE6500 already has an exploit for it too . \nMore details about the attacks in the archive below \ud83e\ude78\n\nNow about TP-LINK - it is also a supplier of Wi-Fi routers for home and office and one of the largest manufacturers of network equipment. \n\nI will also tell you about some cve of their equipment \nFor example CVE-2022-30075  - importing a malicious backup file via web interface can lead to remote code execution due to wrong checks , there is an exploit for it or CVE-2022-24355 this is RCE vulnerability, i.e. it allows intruders in neighboring network to run arbitrary code on router installations . No authentication is required to exploit this vulnerability. The problem arises because there is no proper length check on user data before it is copied to a fixed-length stack buffer. An attacker can use this vulnerability to execute code in a root context. \nRead more about it link\n\nAnd I think that's it .\nIn this post we have analyzed types of attacks and some hardware vulnerabilities. \nRead more in the archive below\ud83c\udf1f .There will be more articles about the attacks in the future.\n\nThank you for reading\u2764\ufe0f\nRemember Alice, there is a rabbit hole in the looking glass, so follow the rabbit \ud83d\udc07\ud83c\udf80\n#network #wifi #attacks #cve #exploit #dos #traffic_analysis #router", "creation_timestamp": "2022-11-09T07:53:43.000000Z"}</description>
      <content:encoded>{"uuid": "40a0e84d-f01d-4701-90e1-89e85f78aef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/310", "content": "Now here are the cve of linksys and Tp-Link equipment\n\nFor those who do not know linksys is a manufacturer of networking equipment for small offices and homes. They make network hubs, routers, and network cards. \n\nFor example, linksys' managed switches include features for rapid network expansion. The STP and Storm Control protocol features help control planned or unintended cable loops linksys help protect the network with port authentication which requires clients to authenticate themselves before they start working, clients must authenticate themselves before transmitting any data. \nSo what are the vulnerabilities of this equipment ?\n\nHere are some cve \nFor example, there is CVE-2022-38555 it is a buffer overflow vulnerability in Linksys E1200 already has a poc  or CVE-2020-35713 remote pre-authentication code execution in Linksys RE6500 already has an exploit for it too . \nMore details about the attacks in the archive below \ud83e\ude78\n\nNow about TP-LINK - it is also a supplier of Wi-Fi routers for home and office and one of the largest manufacturers of network equipment. \n\nI will also tell you about some cve of their equipment \nFor example CVE-2022-30075  - importing a malicious backup file via web interface can lead to remote code execution due to wrong checks , there is an exploit for it or CVE-2022-24355 this is RCE vulnerability, i.e. it allows intruders in neighboring network to run arbitrary code on router installations . No authentication is required to exploit this vulnerability. The problem arises because there is no proper length check on user data before it is copied to a fixed-length stack buffer. An attacker can use this vulnerability to execute code in a root context. \nRead more about it link\n\nAnd I think that's it .\nIn this post we have analyzed types of attacks and some hardware vulnerabilities. \nRead more in the archive below\ud83c\udf1f .There will be more articles about the attacks in the future.\n\nThank you for reading\u2764\ufe0f\nRemember Alice, there is a rabbit hole in the looking glass, so follow the rabbit \ud83d\udc07\ud83c\udf80\n#network #wifi #attacks #cve #exploit #dos #traffic_analysis #router", "creation_timestamp": "2022-11-09T07:53:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/40a0e84d-f01d-4701-90e1-89e85f78aef7/export</guid>
      <pubDate>Wed, 09 Nov 2022 07:53:43 +0000</pubDate>
    </item>
    <item>
      <title>a8f2a026-4517-473d-85e1-bba88a5f9605</title>
      <link>https://db.gcve.eu/sighting/a8f2a026-4517-473d-85e1-bba88a5f9605/export</link>
      <description>{"uuid": "a8f2a026-4517-473d-85e1-bba88a5f9605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/308", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u0432\u0435\u0434\u0443 cve \u0443 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f linksys \u0438 Tp-Link\n\n\u0414\u043b\u044f \u0442\u0435\u0445 \u043a\u0442\u043e \u043d\u0435 \u0437\u043d\u0430\u0435\u0442 linksys \u044d\u0442\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043c\u0430\u043b\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0438 \u0434\u043e\u043c\u0430. \u041e\u043d\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u043e\u043d\u0446\u0435\u043d\u0442\u0440\u0430\u0442\u043e\u0440\u044b, \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b, \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u0430\u0440\u0442\u044b. \n\n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u044b \u043e\u0442 linksys \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u0431\u044b\u0441\u0442\u0440\u043e\u0433\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f  \u0441\u0435\u0442\u0438. \u0424\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 STP \u0438 Storm Control \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043a\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0435\u0442\u043b\u0438 linksys \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u0442\u043e\u0432, \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0435\u0439 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c, \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u0434\u043e\u043b\u0436\u043d\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u043f\u0435\u0440\u0435\u0434 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u043b\u044e\u0431\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \n\u0422\u0430\u043a \u043a\u0430\u043a\u0438\u0435 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443 \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f ?\n\n\u041f\u0440\u0438\u0432\u0435\u0434\u0443 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e cve \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0435\u0441\u0442\u044c CVE-2022-38555 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 Linksys E1200 \u043d\u0430 \u043d\u0435\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c poc \u0438\u043b\u0438 CVE-2020-35713 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Linksys RE6500  \u043d\u0430 \u043d\u0435\u0435 \u0442\u043e\u0436\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  . \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435 \ud83e\ude78\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e TP-LINK-  \u044d\u0442\u043e \u0442\u043e\u0436\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a Wi-Fi\u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0434\u043b\u044f \u0434\u043e\u043c\u0430 \u0438 \u043e\u0444\u0438\u0441\u0430 \u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f  . \n\n\u0422\u043e\u0436\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043f\u0440\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 cve \u0438\u0445 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443  CVE-2022-30075 -  \u0438\u043c\u043f\u043e\u0440\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0439 \u043a\u043e\u043f\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 , \u043d\u0430 \u043d\u0435\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  \u0438\u043b\u0438   CVE-2022-24355 \u044d\u0442\u043e RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442.\u0435 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0435\u0439 \u0441\u0435\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 . \u0414\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0434\u043b\u0438\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 \u0438\u0445 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0442\u0435\u043a\u043e\u0432\u044b\u0439 \u0431\u0443\u0444\u0435\u0440 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0434\u043b\u0438\u043d\u044b. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 root. \n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043e \u043d\u0435\u0439  \u0442\u044b\u043a\n\n\u0410 \u043d\u0430 \u044d\u0442\u043e\u043c \u0434\u0443\u043c\u0430\u044e \u0432\u0441\u0435 .\n\u0412 \u044d\u0442\u043e\u043c \u043f\u043e\u0441\u0442\u0435 \u043c\u044b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0438 \u0432\u0438\u0434\u044b \u0430\u0442\u0430\u043a \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435\ud83c\udf1f .\u0412 \u0431\u0443\u0434\u0443\u0449\u0435\u043c \u0431\u0443\u0434\u0443\u0442  \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u044b \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438\n\n\u0421\u043f\u0430\u0441\u0438\u0431\u043e \u0437\u0430 \u043f\u0440\u043e\u0447\u0442\u0435\u043d\u0438\u0435\u2764\ufe0f\n\u0418 \u043f\u043e\u043c\u043d\u0438 \u0410\u043b\u0438\u0441\u0430 , \u043a\u0440\u043e\u043b\u0438\u0447\u044c\u044f \u043d\u043e\u0440\u0430 \u0435\u0441\u0442\u044c \u0438 \u0432 \u0437\u0430\u0437\u0435\u0440\u043a\u0430\u043b\u044c\u0435 \u043f\u043e \u044d\u0442\u043e\u043c\u0443 \u0441\u043b\u0435\u0434\u0443\u0439 \u0437\u0430 \u043a\u0440\u043e\u043b\u0438\u043a\u043e\u043c \u0438 \u0434\u0430\u043b\u044c\u0448\u0435\ud83d\udc07\ud83c\udf80\n#network  #wifi  #attacks #cve #exploit  #dos  #traffic_analysis #router", "creation_timestamp": "2022-11-15T12:28:38.000000Z"}</description>
      <content:encoded>{"uuid": "a8f2a026-4517-473d-85e1-bba88a5f9605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38555", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/308", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u0432\u0435\u0434\u0443 cve \u0443 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f linksys \u0438 Tp-Link\n\n\u0414\u043b\u044f \u0442\u0435\u0445 \u043a\u0442\u043e \u043d\u0435 \u0437\u043d\u0430\u0435\u0442 linksys \u044d\u0442\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043c\u0430\u043b\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0438 \u0434\u043e\u043c\u0430. \u041e\u043d\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u043e\u043d\u0446\u0435\u043d\u0442\u0440\u0430\u0442\u043e\u0440\u044b, \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b, \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u0430\u0440\u0442\u044b. \n\n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u044b \u043e\u0442 linksys \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u0431\u044b\u0441\u0442\u0440\u043e\u0433\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f  \u0441\u0435\u0442\u0438. \u0424\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 STP \u0438 Storm Control \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043a\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0435\u0442\u043b\u0438 linksys \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u0442\u043e\u0432, \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0435\u0439 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c, \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u0434\u043e\u043b\u0436\u043d\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u043f\u0435\u0440\u0435\u0434 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u043b\u044e\u0431\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \n\u0422\u0430\u043a \u043a\u0430\u043a\u0438\u0435 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443 \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f ?\n\n\u041f\u0440\u0438\u0432\u0435\u0434\u0443 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e cve \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0435\u0441\u0442\u044c CVE-2022-38555 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 Linksys E1200 \u043d\u0430 \u043d\u0435\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c poc \u0438\u043b\u0438 CVE-2020-35713 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Linksys RE6500  \u043d\u0430 \u043d\u0435\u0435 \u0442\u043e\u0436\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  . \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435 \ud83e\ude78\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e TP-LINK-  \u044d\u0442\u043e \u0442\u043e\u0436\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a Wi-Fi\u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0434\u043b\u044f \u0434\u043e\u043c\u0430 \u0438 \u043e\u0444\u0438\u0441\u0430 \u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f  . \n\n\u0422\u043e\u0436\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043f\u0440\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 cve \u0438\u0445 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443  CVE-2022-30075 -  \u0438\u043c\u043f\u043e\u0440\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0439 \u043a\u043e\u043f\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 , \u043d\u0430 \u043d\u0435\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  \u0438\u043b\u0438   CVE-2022-24355 \u044d\u0442\u043e RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442.\u0435 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0435\u0439 \u0441\u0435\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 . \u0414\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0434\u043b\u0438\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 \u0438\u0445 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0442\u0435\u043a\u043e\u0432\u044b\u0439 \u0431\u0443\u0444\u0435\u0440 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0434\u043b\u0438\u043d\u044b. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 root. \n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043e \u043d\u0435\u0439  \u0442\u044b\u043a\n\n\u0410 \u043d\u0430 \u044d\u0442\u043e\u043c \u0434\u0443\u043c\u0430\u044e \u0432\u0441\u0435 .\n\u0412 \u044d\u0442\u043e\u043c \u043f\u043e\u0441\u0442\u0435 \u043c\u044b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0438 \u0432\u0438\u0434\u044b \u0430\u0442\u0430\u043a \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435\ud83c\udf1f .\u0412 \u0431\u0443\u0434\u0443\u0449\u0435\u043c \u0431\u0443\u0434\u0443\u0442  \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u044b \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438\n\n\u0421\u043f\u0430\u0441\u0438\u0431\u043e \u0437\u0430 \u043f\u0440\u043e\u0447\u0442\u0435\u043d\u0438\u0435\u2764\ufe0f\n\u0418 \u043f\u043e\u043c\u043d\u0438 \u0410\u043b\u0438\u0441\u0430 , \u043a\u0440\u043e\u043b\u0438\u0447\u044c\u044f \u043d\u043e\u0440\u0430 \u0435\u0441\u0442\u044c \u0438 \u0432 \u0437\u0430\u0437\u0435\u0440\u043a\u0430\u043b\u044c\u0435 \u043f\u043e \u044d\u0442\u043e\u043c\u0443 \u0441\u043b\u0435\u0434\u0443\u0439 \u0437\u0430 \u043a\u0440\u043e\u043b\u0438\u043a\u043e\u043c \u0438 \u0434\u0430\u043b\u044c\u0448\u0435\ud83d\udc07\ud83c\udf80\n#network  #wifi  #attacks #cve #exploit  #dos  #traffic_analysis #router", "creation_timestamp": "2022-11-15T12:28:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a8f2a026-4517-473d-85e1-bba88a5f9605/export</guid>
      <pubDate>Tue, 15 Nov 2022 12:28:38 +0000</pubDate>
    </item>
    <item>
      <title>6a07e298-f105-4c5e-93b5-4ee02cd48be5</title>
      <link>https://db.gcve.eu/sighting/6a07e298-f105-4c5e-93b5-4ee02cd48be5/export</link>
      <description>{"uuid": "6a07e298-f105-4c5e-93b5-4ee02cd48be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/cibsecurity/56195", "content": "\u203c CVE-2022-3855 \u203c\n\nThe 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-10T02:28:06.000000Z"}</description>
      <content:encoded>{"uuid": "6a07e298-f105-4c5e-93b5-4ee02cd48be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/cibsecurity/56195", "content": "\u203c CVE-2022-3855 \u203c\n\nThe 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-10T02:28:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6a07e298-f105-4c5e-93b5-4ee02cd48be5/export</guid>
      <pubDate>Tue, 10 Jan 2023 02:28:06 +0000</pubDate>
    </item>
    <item>
      <title>82783f30-90a9-40eb-b68d-9c6d3fa4e894</title>
      <link>https://db.gcve.eu/sighting/82783f30-90a9-40eb-b68d-9c6d3fa4e894/export</link>
      <description>{"uuid": "82783f30-90a9-40eb-b68d-9c6d3fa4e894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11129", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3855\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2023-01-09T22:13:43.274Z\n\ud83d\udccf Modified: 2025-04-09T18:38:24.520Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb", "creation_timestamp": "2025-04-09T18:48:00.000000Z"}</description>
      <content:encoded>{"uuid": "82783f30-90a9-40eb-b68d-9c6d3fa4e894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3855", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11129", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3855\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The 404 to Start WordPress plugin through 1.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2023-01-09T22:13:43.274Z\n\ud83d\udccf Modified: 2025-04-09T18:38:24.520Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb", "creation_timestamp": "2025-04-09T18:48:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/82783f30-90a9-40eb-b68d-9c6d3fa4e894/export</guid>
      <pubDate>Wed, 09 Apr 2025 18:48:00 +0000</pubDate>
    </item>
    <item>
      <title>d227a724-6e04-41a6-8d68-9495fad7fed4</title>
      <link>https://db.gcve.eu/sighting/d227a724-6e04-41a6-8d68-9495fad7fed4/export</link>
      <description>{"uuid": "d227a724-6e04-41a6-8d68-9495fad7fed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-38553\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\ud83d\udccf Published: 2022-09-26T09:59:06.000Z\n\ud83d\udccf Modified: 2025-05-21T16:14:51.489Z\n\ud83d\udd17 References:\n1. http://academy.com\n2. https://codecanyon.net/item/academy-course-based-learning-management-system/22703468\n3. https://demo.creativeitem.com/academy/home/\n4. https://demo.creativeitem.com/academy/home/search?query=%22%3E%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E\n5. https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md", "creation_timestamp": "2025-05-21T16:41:59.000000Z"}</description>
      <content:encoded>{"uuid": "d227a724-6e04-41a6-8d68-9495fad7fed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38553", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-38553\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\n\ud83d\udccf Published: 2022-09-26T09:59:06.000Z\n\ud83d\udccf Modified: 2025-05-21T16:14:51.489Z\n\ud83d\udd17 References:\n1. http://academy.com\n2. https://codecanyon.net/item/academy-course-based-learning-management-system/22703468\n3. https://demo.creativeitem.com/academy/home/\n4. https://demo.creativeitem.com/academy/home/search?query=%22%3E%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E\n5. https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md", "creation_timestamp": "2025-05-21T16:41:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d227a724-6e04-41a6-8d68-9495fad7fed4/export</guid>
      <pubDate>Wed, 21 May 2025 16:41:59 +0000</pubDate>
    </item>
  </channel>
</rss>
