<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:48:31.502741+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f1d860c6-23ef-4e9a-871a-69fbb31d9194/export</id>
    <title>f1d860c6-23ef-4e9a-871a-69fbb31d9194</title>
    <updated>2026-05-04T09:48:31.731573+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f1d860c6-23ef-4e9a-871a-69fbb31d9194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41128", "type": "seen", "source": "http://www.twitter.com/circl_lu/status/1590304391315148800", "content": "", "creation_timestamp": "2024-11-20T14:08:12.457451Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f1d860c6-23ef-4e9a-871a-69fbb31d9194/export"/>
    <published>2024-11-20T14:08:12.457451+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/28b03fcb-3994-4057-91fc-2ff3d45edce3/export</id>
    <title>28b03fcb-3994-4057-91fc-2ff3d45edce3</title>
    <updated>2026-05-04T09:48:31.731477+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "28b03fcb-3994-4057-91fc-2ff3d45edce3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41128", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971737", "content": "", "creation_timestamp": "2024-12-24T20:33:27.254595Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/28b03fcb-3994-4057-91fc-2ff3d45edce3/export"/>
    <published>2024-12-24T20:33:27.254595+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/29a635a6-ed84-4a47-8546-5dc3da0f21d9/export</id>
    <title>29a635a6-ed84-4a47-8546-5dc3da0f21d9</title>
    <updated>2026-05-04T09:48:31.731395+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "29a635a6-ed84-4a47-8546-5dc3da0f21d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41125", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971738", "content": "", "creation_timestamp": "2024-12-24T20:33:28.001415Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/29a635a6-ed84-4a47-8546-5dc3da0f21d9/export"/>
    <published>2024-12-24T20:33:28.001415+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86a0a083-fa7d-4526-8c9e-f13597d1bc36/export</id>
    <title>86a0a083-fa7d-4526-8c9e-f13597d1bc36</title>
    <updated>2026-05-04T09:48:31.731315+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86a0a083-fa7d-4526-8c9e-f13597d1bc36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41125", "type": "seen", "source": "Telegram/7nXEMrB5TmapJ_9YLM9xLxxYnxTUIvZm1dxLwXc2ewiX3afN", "content": "", "creation_timestamp": "2025-02-06T02:41:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86a0a083-fa7d-4526-8c9e-f13597d1bc36/export"/>
    <published>2025-02-06T02:41:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90398f65-d5ed-4e38-903b-41e3c571d0b6/export</id>
    <title>90398f65-d5ed-4e38-903b-41e3c571d0b6</title>
    <updated>2026-05-04T09:48:31.731237+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90398f65-d5ed-4e38-903b-41e3c571d0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41128", "type": "seen", "source": "https://bsky.app/profile/lazarusholic.bsky.social/post/3lhtaukgawf2y", "content": "", "creation_timestamp": "2025-02-10T13:30:09.892378Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90398f65-d5ed-4e38-903b-41e3c571d0b6/export"/>
    <published>2025-02-10T13:30:09.892378+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02dff8d4-89e7-4f76-8566-8326e131cf3d/export</id>
    <title>02dff8d4-89e7-4f76-8566-8326e131cf3d</title>
    <updated>2026-05-04T09:48:31.731151+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02dff8d4-89e7-4f76-8566-8326e131cf3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41125", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02dff8d4-89e7-4f76-8566-8326e131cf3d/export"/>
    <published>2025-02-23T02:10:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b1cc4a28-165e-4ac0-bec9-411b8536771f/export</id>
    <title>b1cc4a28-165e-4ac0-bec9-411b8536771f</title>
    <updated>2026-05-04T09:48:31.731050+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b1cc4a28-165e-4ac0-bec9-411b8536771f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41128", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b1cc4a28-165e-4ac0-bec9-411b8536771f/export"/>
    <published>2025-02-23T02:10:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7031155-16a7-4bd3-98aa-1ef849abf113/export</id>
    <title>c7031155-16a7-4bd3-98aa-1ef849abf113</title>
    <updated>2026-05-04T09:48:31.730091+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7031155-16a7-4bd3-98aa-1ef849abf113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4112", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12223", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Quizlord WordPress plugin through 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\n\ud83d\udccf Published: 2022-12-19T13:41:46.228Z\n\ud83d\udccf Modified: 2025-04-17T13:44:31.787Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e", "creation_timestamp": "2025-04-17T13:57:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7031155-16a7-4bd3-98aa-1ef849abf113/export"/>
    <published>2025-04-17T13:57:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de47874d-2c26-4791-9076-864abe56efa0/export</id>
    <title>de47874d-2c26-4791-9076-864abe56efa0</title>
    <updated>2026-05-04T09:48:31.729952+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://vulnerability.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "de47874d-2c26-4791-9076-864abe56efa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-41125", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f6155ae3-27af-4aa4-a6c0-e8b50f5d61c1", "content": "", "creation_timestamp": "2026-02-02T12:27:09.807940Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de47874d-2c26-4791-9076-864abe56efa0/export"/>
    <published>2026-02-02T12:27:09.807940+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aa27fce9-e435-4c5d-a8c1-2cd0c502ace2/export</id>
    <title>aa27fce9-e435-4c5d-a8c1-2cd0c502ace2</title>
    <updated>2026-05-04T09:48:31.727821+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://vulnerability.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "aa27fce9-e435-4c5d-a8c1-2cd0c502ace2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-41128", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c23ab43a-aab6-4fb8-b8dd-0d473720c7ad", "content": "", "creation_timestamp": "2026-02-02T12:27:09.931760Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aa27fce9-e435-4c5d-a8c1-2cd0c502ace2/export"/>
    <published>2026-02-02T12:27:09.931760+00:00</published>
  </entry>
</feed>
