<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 05:55:10 +0000</lastBuildDate>
    <item>
      <title>0e4bb7a6-3ce8-41df-9470-15d84ccb60e9</title>
      <link>https://vulnerability.circl.lu/sighting/0e4bb7a6-3ce8-41df-9470-15d84ccb60e9/export</link>
      <description>{"uuid": "0e4bb7a6-3ce8-41df-9470-15d84ccb60e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28290", "type": "seen", "source": "https://t.me/cibsecurity/41412", "content": "\u203c CVE-2022-28290 \u203c\n\nReflective Cross-Site Scripting vulnerability in WordPress Country Selector Plugin Version 1.6.5. The XSS payload executes whenever the user tries to access the country selector page with the specified payload as a part of the HTTP request\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-25T20:42:20.000000Z"}</description>
      <content:encoded>{"uuid": "0e4bb7a6-3ce8-41df-9470-15d84ccb60e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28290", "type": "seen", "source": "https://t.me/cibsecurity/41412", "content": "\u203c CVE-2022-28290 \u203c\n\nReflective Cross-Site Scripting vulnerability in WordPress Country Selector Plugin Version 1.6.5. The XSS payload executes whenever the user tries to access the country selector page with the specified payload as a part of the HTTP request\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-25T20:42:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0e4bb7a6-3ce8-41df-9470-15d84ccb60e9/export</guid>
      <pubDate>Mon, 25 Apr 2022 20:42:20 +0000</pubDate>
    </item>
    <item>
      <title>5a62c68e-bc73-413b-b85f-346ef974aa41</title>
      <link>https://vulnerability.circl.lu/sighting/5a62c68e-bc73-413b-b85f-346ef974aa41/export</link>
      <description>{"uuid": "5a62c68e-bc73-413b-b85f-346ef974aa41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2829", "type": "seen", "source": "https://t.me/cibsecurity/48563", "content": "\u203c CVE-2022-2829 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T07:21:02.000000Z"}</description>
      <content:encoded>{"uuid": "5a62c68e-bc73-413b-b85f-346ef974aa41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2829", "type": "seen", "source": "https://t.me/cibsecurity/48563", "content": "\u203c CVE-2022-2829 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T07:21:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5a62c68e-bc73-413b-b85f-346ef974aa41/export</guid>
      <pubDate>Tue, 23 Aug 2022 07:21:02 +0000</pubDate>
    </item>
    <item>
      <title>e777f12a-a701-4c36-8723-75a381ffee5a</title>
      <link>https://vulnerability.circl.lu/sighting/e777f12a-a701-4c36-8723-75a381ffee5a/export</link>
      <description>{"uuid": "e777f12a-a701-4c36-8723-75a381ffee5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28291", "type": "seen", "source": "https://t.me/cibsecurity/51604", "content": "\u203c CVE-2022-28291 \u203c\n\nInsufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the \u00e2\u20ac\u0153nessusd\u00e2\u20ac\ufffd process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers\u00e2\u20ac\u2122 network of assets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T20:13:19.000000Z"}</description>
      <content:encoded>{"uuid": "e777f12a-a701-4c36-8723-75a381ffee5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28291", "type": "seen", "source": "https://t.me/cibsecurity/51604", "content": "\u203c CVE-2022-28291 \u203c\n\nInsufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the \u00e2\u20ac\u0153nessusd\u00e2\u20ac\ufffd process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers\u00e2\u20ac\u2122 network of assets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T20:13:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e777f12a-a701-4c36-8723-75a381ffee5a/export</guid>
      <pubDate>Mon, 17 Oct 2022 20:13:19 +0000</pubDate>
    </item>
  </channel>
</rss>
