<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:15:30 +0000</lastBuildDate>
    <item>
      <title>7cff5fab-97b8-474f-bea5-a12285d04038</title>
      <link>https://vulnerability.circl.lu/sighting/7cff5fab-97b8-474f-bea5-a12285d04038/export</link>
      <description>{"uuid": "7cff5fab-97b8-474f-bea5-a12285d04038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31136", "type": "seen", "source": "https://t.me/cibsecurity/45763", "content": "\u203c CVE-2022-31136 \u203c\n\nBookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-07T22:15:31.000000Z"}</description>
      <content:encoded>{"uuid": "7cff5fab-97b8-474f-bea5-a12285d04038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31136", "type": "seen", "source": "https://t.me/cibsecurity/45763", "content": "\u203c CVE-2022-31136 \u203c\n\nBookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-07T22:15:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7cff5fab-97b8-474f-bea5-a12285d04038/export</guid>
      <pubDate>Thu, 07 Jul 2022 22:15:31 +0000</pubDate>
    </item>
  </channel>
</rss>
