<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:56:09 +0000</lastBuildDate>
    <item>
      <title>ab73666f-1006-4d3f-90f6-6b059ea4d25a</title>
      <link>https://vulnerability.circl.lu/sighting/ab73666f-1006-4d3f-90f6-6b059ea4d25a/export</link>
      <description>{"uuid": "ab73666f-1006-4d3f-90f6-6b059ea4d25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24811", "type": "seen", "source": "https://t.me/cibsecurity/40193", "content": "\u203c CVE-2022-24811 \u203c\n\nCombodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T22:29:06.000000Z"}</description>
      <content:encoded>{"uuid": "ab73666f-1006-4d3f-90f6-6b059ea4d25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24811", "type": "seen", "source": "https://t.me/cibsecurity/40193", "content": "\u203c CVE-2022-24811 \u203c\n\nCombodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T22:29:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ab73666f-1006-4d3f-90f6-6b059ea4d25a/export</guid>
      <pubDate>Tue, 05 Apr 2022 22:29:06 +0000</pubDate>
    </item>
  </channel>
</rss>
