<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T07:33:39.283857+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca647d32-6b98-47de-8146-8ae844cebb86/export</id>
    <title>ca647d32-6b98-47de-8146-8ae844cebb86</title>
    <updated>2026-05-05T07:33:39.681013+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca647d32-6b98-47de-8146-8ae844cebb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33075", "type": "seen", "source": "https://t.me/cibsecurity/45613", "content": "\u203c CVE-2022-33075 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in the Add Classification function of Zoo Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via unspecified vectors.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-05T22:13:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca647d32-6b98-47de-8146-8ae844cebb86/export"/>
    <published>2022-07-05T22:13:38+00:00</published>
  </entry>
</feed>
