<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T13:20:47.212469+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0e4bb7a6-3ce8-41df-9470-15d84ccb60e9/export</id>
    <title>0e4bb7a6-3ce8-41df-9470-15d84ccb60e9</title>
    <updated>2026-05-09T13:20:47.583451+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0e4bb7a6-3ce8-41df-9470-15d84ccb60e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28290", "type": "seen", "source": "https://t.me/cibsecurity/41412", "content": "\u203c CVE-2022-28290 \u203c\n\nReflective Cross-Site Scripting vulnerability in WordPress Country Selector Plugin Version 1.6.5. The XSS payload executes whenever the user tries to access the country selector page with the specified payload as a part of the HTTP request\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-25T20:42:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0e4bb7a6-3ce8-41df-9470-15d84ccb60e9/export"/>
    <published>2022-04-25T20:42:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5a62c68e-bc73-413b-b85f-346ef974aa41/export</id>
    <title>5a62c68e-bc73-413b-b85f-346ef974aa41</title>
    <updated>2026-05-09T13:20:47.583308+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5a62c68e-bc73-413b-b85f-346ef974aa41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2829", "type": "seen", "source": "https://t.me/cibsecurity/48563", "content": "\u203c CVE-2022-2829 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T07:21:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5a62c68e-bc73-413b-b85f-346ef974aa41/export"/>
    <published>2022-08-23T07:21:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e777f12a-a701-4c36-8723-75a381ffee5a/export</id>
    <title>e777f12a-a701-4c36-8723-75a381ffee5a</title>
    <updated>2026-05-09T13:20:47.580229+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e777f12a-a701-4c36-8723-75a381ffee5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28291", "type": "seen", "source": "https://t.me/cibsecurity/51604", "content": "\u203c CVE-2022-28291 \u203c\n\nInsufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the \u00e2\u20ac\u0153nessusd\u00e2\u20ac\ufffd process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers\u00e2\u20ac\u2122 network of assets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T20:13:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e777f12a-a701-4c36-8723-75a381ffee5a/export"/>
    <published>2022-10-17T20:13:19+00:00</published>
  </entry>
</feed>
