<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 05:27:49 +0000</lastBuildDate>
    <item>
      <title>b4ba3710-705f-4c4b-adbd-d721952f8e8a</title>
      <link>https://vulnerability.circl.lu/sighting/b4ba3710-705f-4c4b-adbd-d721952f8e8a/export</link>
      <description>{"uuid": "b4ba3710-705f-4c4b-adbd-d721952f8e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189791", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:22:03.000000Z"}</description>
      <content:encoded>{"uuid": "b4ba3710-705f-4c4b-adbd-d721952f8e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189791", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:22:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b4ba3710-705f-4c4b-adbd-d721952f8e8a/export</guid>
      <pubDate>Wed, 21 Feb 2024 17:22:03 +0000</pubDate>
    </item>
    <item>
      <title>bb6b0f91-936c-4e03-a2a3-99cd88b7ea95</title>
      <link>https://vulnerability.circl.lu/sighting/bb6b0f91-936c-4e03-a2a3-99cd88b7ea95/export</link>
      <description>{"uuid": "bb6b0f91-936c-4e03-a2a3-99cd88b7ea95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189805", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:31:24.000000Z"}</description>
      <content:encoded>{"uuid": "bb6b0f91-936c-4e03-a2a3-99cd88b7ea95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/ctinow/189805", "content": "https://ift.tt/ThugG2F\nCVE-2022-45179", "creation_timestamp": "2024-02-21T17:31:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bb6b0f91-936c-4e03-a2a3-99cd88b7ea95/export</guid>
      <pubDate>Wed, 21 Feb 2024 17:31:24 +0000</pubDate>
    </item>
    <item>
      <title>9924d2e9-eb93-4999-9168-93551cabd105</title>
      <link>https://vulnerability.circl.lu/sighting/9924d2e9-eb93-4999-9168-93551cabd105/export</link>
      <description>{"uuid": "9924d2e9-eb93-4999-9168-93551cabd105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/arpsyndicate/4013", "content": "#ExploitObserverAlert\n\nCVE-2022-45179\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45179. An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials).", "creation_timestamp": "2024-02-22T19:28:38.000000Z"}</description>
      <content:encoded>{"uuid": "9924d2e9-eb93-4999-9168-93551cabd105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45179", "type": "seen", "source": "https://t.me/arpsyndicate/4013", "content": "#ExploitObserverAlert\n\nCVE-2022-45179\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45179. An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials).", "creation_timestamp": "2024-02-22T19:28:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9924d2e9-eb93-4999-9168-93551cabd105/export</guid>
      <pubDate>Thu, 22 Feb 2024 19:28:38 +0000</pubDate>
    </item>
  </channel>
</rss>
