<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T15:09:33.069023+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9cf2e7fd-672e-4c74-9b2b-6e8cbf9a5a3c/export</id>
    <title>9cf2e7fd-672e-4c74-9b2b-6e8cbf9a5a3c</title>
    <updated>2026-05-01T15:09:33.419197+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9cf2e7fd-672e-4c74-9b2b-6e8cbf9a5a3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28872", "type": "seen", "source": "https://t.me/cibsecurity/42469", "content": "\u203c CVE-2022-28872 \u203c\n\nA vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T16:35:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9cf2e7fd-672e-4c74-9b2b-6e8cbf9a5a3c/export"/>
    <published>2022-05-12T16:35:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/52cb8019-3529-432e-957a-40fb08a874e3/export</id>
    <title>52cb8019-3529-432e-957a-40fb08a874e3</title>
    <updated>2026-05-01T15:09:33.419083+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "52cb8019-3529-432e-957a-40fb08a874e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28873", "type": "seen", "source": "https://t.me/cibsecurity/42468", "content": "\u203c CVE-2022-28873 \u203c\n\nA vulnerability affecting F-Secure SAFE browser was discovered. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T16:35:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/52cb8019-3529-432e-957a-40fb08a874e3/export"/>
    <published>2022-05-12T16:35:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3cd95611-9caf-4754-b704-2ab764a580fa/export</id>
    <title>3cd95611-9caf-4754-b704-2ab764a580fa</title>
    <updated>2026-05-01T15:09:33.418972+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3cd95611-9caf-4754-b704-2ab764a580fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28874", "type": "seen", "source": "https://t.me/cibsecurity/43158", "content": "\u203c CVE-2022-28874 \u203c\n\nMultiple Denial-of-Service vulnerabilities was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files cause memory corruption and heap buffer overflow which eventually can crash the scanning engine. The exploit can be triggered remotely by an attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-23T14:36:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3cd95611-9caf-4754-b704-2ab764a580fa/export"/>
    <published>2022-05-23T14:36:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/65904293-1abc-4b42-8786-2c68eb969d81/export</id>
    <title>65904293-1abc-4b42-8786-2c68eb969d81</title>
    <updated>2026-05-01T15:09:33.418853+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "65904293-1abc-4b42-8786-2c68eb969d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28876", "type": "seen", "source": "https://t.me/cibsecurity/46248", "content": "\u203c CVE-2022-28876 \u203c\n\nA Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-14T18:32:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/65904293-1abc-4b42-8786-2c68eb969d81/export"/>
    <published>2022-07-14T18:32:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c4ea76af-08c6-4cc9-8bf7-2a2dcf39e78d/export</id>
    <title>c4ea76af-08c6-4cc9-8bf7-2a2dcf39e78d</title>
    <updated>2026-05-01T15:09:33.418735+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c4ea76af-08c6-4cc9-8bf7-2a2dcf39e78d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28877", "type": "seen", "source": "https://t.me/cibsecurity/46756", "content": "\u203c CVE-2022-28877 \u203c\n\nThis vulnerability allows local user to delete arbitrary file in the system and bypassing security protection which can be abused for local privilege escalation on affected F-Secure &amp;amp; WithSecure windows endpoint products. An attacker must have code execution rights on the victim machine prior to successful exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-21T20:18:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c4ea76af-08c6-4cc9-8bf7-2a2dcf39e78d/export"/>
    <published>2022-07-21T20:18:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a65c0ab-b0c3-4fe5-86f8-9dbcec0d4d3e/export</id>
    <title>9a65c0ab-b0c3-4fe5-86f8-9dbcec0d4d3e</title>
    <updated>2026-05-01T15:09:33.418578+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a65c0ab-b0c3-4fe5-86f8-9dbcec0d4d3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28879", "type": "seen", "source": "https://t.me/cibsecurity/46831", "content": "\u203c CVE-2022-28879 \u203c\n\nA Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-22T20:23:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a65c0ab-b0c3-4fe5-86f8-9dbcec0d4d3e/export"/>
    <published>2022-07-22T20:23:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d4333bf-5273-401e-bb30-19716cc21211/export</id>
    <title>2d4333bf-5273-401e-bb30-19716cc21211</title>
    <updated>2026-05-01T15:09:33.416605+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2d4333bf-5273-401e-bb30-19716cc21211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2887", "type": "seen", "source": "https://t.me/cibsecurity/49884", "content": "\u203c CVE-2022-2887 \u203c\n\nThe WP Server Health Stats WordPress plugin before 1.7.0 does not escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T12:42:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d4333bf-5273-401e-bb30-19716cc21211/export"/>
    <published>2022-09-16T12:42:15+00:00</published>
  </entry>
</feed>
