<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:56:39.049402+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ab73666f-1006-4d3f-90f6-6b059ea4d25a/export</id>
    <title>ab73666f-1006-4d3f-90f6-6b059ea4d25a</title>
    <updated>2026-05-04T13:56:39.533678+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ab73666f-1006-4d3f-90f6-6b059ea4d25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24811", "type": "seen", "source": "https://t.me/cibsecurity/40193", "content": "\u203c CVE-2022-24811 \u203c\n\nCombodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T22:29:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ab73666f-1006-4d3f-90f6-6b059ea4d25a/export"/>
    <published>2022-04-05T22:29:06+00:00</published>
  </entry>
</feed>
