<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T15:39:10.772274+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/502802cb-945d-4005-8104-5ac7ebbaf27d/export</id>
    <title>502802cb-945d-4005-8104-5ac7ebbaf27d</title>
    <updated>2026-05-04T15:39:11.127798+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "502802cb-945d-4005-8104-5ac7ebbaf27d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38771", "type": "seen", "source": "https://t.me/cibsecurity/49745", "content": "\u203c CVE-2022-38771 \u203c\n\nThe mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to send SCRIPT tags as injected input to the API request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-14T02:25:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/502802cb-945d-4005-8104-5ac7ebbaf27d/export"/>
    <published>2022-09-14T02:25:49+00:00</published>
  </entry>
</feed>
