<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T05:27:49.853364+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b4ba3710-705f-4c4b-adbd-d721952f8e8a/export</id>
    <title>b4ba3710-705f-4c4b-adbd-d721952f8e8a</title>
    <updated>2026-05-06T05:27:50.231733+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b4ba3710-705f-4c4b-adbd-d721952f8e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189791", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:22:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b4ba3710-705f-4c4b-adbd-d721952f8e8a/export"/>
    <published>2024-02-21T17:22:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bb6b0f91-936c-4e03-a2a3-99cd88b7ea95/export</id>
    <title>bb6b0f91-936c-4e03-a2a3-99cd88b7ea95</title>
    <updated>2026-05-06T05:27:50.231626+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bb6b0f91-936c-4e03-a2a3-99cd88b7ea95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189805", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:31:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bb6b0f91-936c-4e03-a2a3-99cd88b7ea95/export"/>
    <published>2024-02-21T17:31:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9924d2e9-eb93-4999-9168-93551cabd105/export</id>
    <title>9924d2e9-eb93-4999-9168-93551cabd105</title>
    <updated>2026-05-06T05:27:50.228583+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9924d2e9-eb93-4999-9168-93551cabd105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/arpsyndicate/4013", "content": "#ExploitObserverAlert\n\nCVE-2022-45179\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45179. An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials).", "creation_timestamp": "2024-02-22T19:28:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9924d2e9-eb93-4999-9168-93551cabd105/export"/>
    <published>2024-02-22T19:28:38+00:00</published>
  </entry>
</feed>
