<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 03:53:29 +0000</lastBuildDate>
    <item>
      <title>5889f4c9-3947-4f5f-976b-1a8dc4cfc653</title>
      <link>https://vulnerability.circl.lu/sighting/5889f4c9-3947-4f5f-976b-1a8dc4cfc653/export</link>
      <description>{"uuid": "5889f4c9-3947-4f5f-976b-1a8dc4cfc653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-22723", "type": "seen", "source": "https://t.me/cibsecurity/16562", "content": "\u203c CVE-2020-22723 \u203c\n\nA cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-19T00:40:40.000000Z"}</description>
      <content:encoded>{"uuid": "5889f4c9-3947-4f5f-976b-1a8dc4cfc653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-22723", "type": "seen", "source": "https://t.me/cibsecurity/16562", "content": "\u203c CVE-2020-22723 \u203c\n\nA cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-19T00:40:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5889f4c9-3947-4f5f-976b-1a8dc4cfc653/export</guid>
      <pubDate>Thu, 19 Nov 2020 00:40:40 +0000</pubDate>
    </item>
    <item>
      <title>08eeb233-ea90-441b-b67a-ad933ce27e30</title>
      <link>https://vulnerability.circl.lu/sighting/08eeb233-ea90-441b-b67a-ad933ce27e30/export</link>
      <description>{"uuid": "08eeb233-ea90-441b-b67a-ad933ce27e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-22723", "type": "seen", "source": "https://t.me/cibsecurity/17396", "content": "\u203c CVE-2020-22723 \u203c\n\nA cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T06:25:18.000000Z"}</description>
      <content:encoded>{"uuid": "08eeb233-ea90-441b-b67a-ad933ce27e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-22723", "type": "seen", "source": "https://t.me/cibsecurity/17396", "content": "\u203c CVE-2020-22723 \u203c\n\nA cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T06:25:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/08eeb233-ea90-441b-b67a-ad933ce27e30/export</guid>
      <pubDate>Wed, 09 Dec 2020 06:25:18 +0000</pubDate>
    </item>
  </channel>
</rss>
