<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:29:47 +0000</lastBuildDate>
    <item>
      <title>f86673a6-eb6d-4d64-9c50-c1bea9aac505</title>
      <link>https://vulnerability.circl.lu/sighting/f86673a6-eb6d-4d64-9c50-c1bea9aac505/export</link>
      <description>{"uuid": "f86673a6-eb6d-4d64-9c50-c1bea9aac505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4784", "type": "seen", "source": "https://t.me/cibsecurity/58572", "content": "\u203c CVE-2022-4784 \u203c\n\nThe Hueman Addons WordPress plugin through 2.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:16:47.000000Z"}</description>
      <content:encoded>{"uuid": "f86673a6-eb6d-4d64-9c50-c1bea9aac505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4784", "type": "seen", "source": "https://t.me/cibsecurity/58572", "content": "\u203c CVE-2022-4784 \u203c\n\nThe Hueman Addons WordPress plugin through 2.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:16:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f86673a6-eb6d-4d64-9c50-c1bea9aac505/export</guid>
      <pubDate>Tue, 21 Feb 2023 12:16:47 +0000</pubDate>
    </item>
    <item>
      <title>5db5de22-7035-448d-9fa7-eefd69219022</title>
      <link>https://vulnerability.circl.lu/sighting/5db5de22-7035-448d-9fa7-eefd69219022/export</link>
      <description>{"uuid": "5db5de22-7035-448d-9fa7-eefd69219022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47848", "type": "seen", "source": "https://t.me/cibsecurity/70600", "content": "\u203c CVE-2022-47848 \u203c\n\nAn issue was discovered in Bezeq Vtech NB403-IL version BZ_2.02.07.09.13.01 and Vtech IAD604-IL versions BZ_2.02.07.09.13.01, BZ_2.02.07.09.13T, and BZ_2.02.07.09.09T, allows remote attackers to gain sensitive information via rootDesc.xml page of the UPnP service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-15T20:25:34.000000Z"}</description>
      <content:encoded>{"uuid": "5db5de22-7035-448d-9fa7-eefd69219022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47848", "type": "seen", "source": "https://t.me/cibsecurity/70600", "content": "\u203c CVE-2022-47848 \u203c\n\nAn issue was discovered in Bezeq Vtech NB403-IL version BZ_2.02.07.09.13.01 and Vtech IAD604-IL versions BZ_2.02.07.09.13.01, BZ_2.02.07.09.13T, and BZ_2.02.07.09.09T, allows remote attackers to gain sensitive information via rootDesc.xml page of the UPnP service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-15T20:25:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5db5de22-7035-448d-9fa7-eefd69219022/export</guid>
      <pubDate>Fri, 15 Sep 2023 20:25:34 +0000</pubDate>
    </item>
    <item>
      <title>dc369161-7b40-431e-8d29-7fc4c389d331</title>
      <link>https://vulnerability.circl.lu/sighting/dc369161-7b40-431e-8d29-7fc4c389d331/export</link>
      <description>{"uuid": "dc369161-7b40-431e-8d29-7fc4c389d331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4784", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7560", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4784\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Hueman Addons WordPress plugin through 2.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks\n\ud83d\udccf Published: 2023-02-21T08:50:50.067Z\n\ud83d\udccf Modified: 2025-03-14T13:56:39.577Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9", "creation_timestamp": "2025-03-14T14:45:17.000000Z"}</description>
      <content:encoded>{"uuid": "dc369161-7b40-431e-8d29-7fc4c389d331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4784", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7560", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4784\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Hueman Addons WordPress plugin through 2.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks\n\ud83d\udccf Published: 2023-02-21T08:50:50.067Z\n\ud83d\udccf Modified: 2025-03-14T13:56:39.577Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9", "creation_timestamp": "2025-03-14T14:45:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc369161-7b40-431e-8d29-7fc4c389d331/export</guid>
      <pubDate>Fri, 14 Mar 2025 14:45:17 +0000</pubDate>
    </item>
  </channel>
</rss>
