<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T05:29:11.353898+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/871781a5-7450-4a1a-84d4-1b05de5b12ec/export</id>
    <title>871781a5-7450-4a1a-84d4-1b05de5b12ec</title>
    <updated>2026-05-09T05:29:11.725652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "871781a5-7450-4a1a-84d4-1b05de5b12ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24572", "type": "seen", "source": "https://t.me/cibsecurity/38172", "content": "\u203c CVE-2022-24572 \u203c\n\nCar Driving School Management System v1.0 is affected by Cross Site Scripting (XSS) in the User Enrollment Form (Username Field). To exploit this Vulnerability, an admin views the registered user details.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-28T16:23:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/871781a5-7450-4a1a-84d4-1b05de5b12ec/export"/>
    <published>2022-02-28T16:23:14+00:00</published>
  </entry>
</feed>
