<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 19:41:09 +0000</lastBuildDate>
    <item>
      <title>f710f934-1201-4fb0-a8a8-6e41e8439723</title>
      <link>https://vulnerability.circl.lu/sighting/f710f934-1201-4fb0-a8a8-6e41e8439723/export</link>
      <description>{"uuid": "f710f934-1201-4fb0-a8a8-6e41e8439723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14478", "type": "seen", "source": "https://t.me/cibsecurity/20946", "content": "\u203c CVE-2019-14478 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose \"Display Name\" contains an XSS payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T20:41:51.000000Z"}</description>
      <content:encoded>{"uuid": "f710f934-1201-4fb0-a8a8-6e41e8439723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14478", "type": "seen", "source": "https://t.me/cibsecurity/20946", "content": "\u203c CVE-2019-14478 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose \"Display Name\" contains an XSS payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T20:41:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f710f934-1201-4fb0-a8a8-6e41e8439723/export</guid>
      <pubDate>Wed, 16 Dec 2020 20:41:51 +0000</pubDate>
    </item>
  </channel>
</rss>
