<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T23:40:41.969075+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a4c62ad-8aa6-4d21-9927-6c7c6c186e96/export</id>
    <title>6a4c62ad-8aa6-4d21-9927-6c7c6c186e96</title>
    <updated>2026-05-06T23:40:42.339269+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a4c62ad-8aa6-4d21-9927-6c7c6c186e96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34834", "type": "seen", "source": "https://t.me/cibsecurity/73090", "content": "\u203c CVE-2022-34834 \u203c\n\nAn issue was discovered in VERMEG AgileReporter 21.3. Attackers can gain privileges via an XSS payload in an Add Comment action to the Activity log.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a4c62ad-8aa6-4d21-9927-6c7c6c186e96/export"/>
    <published>2023-10-28T00:17:30+00:00</published>
  </entry>
</feed>
