<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T07:13:03.423261+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e282c384-e672-4e12-b4bc-95ccfb4a1024/export</id>
    <title>e282c384-e672-4e12-b4bc-95ccfb4a1024</title>
    <updated>2026-05-05T07:13:03.723655+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e282c384-e672-4e12-b4bc-95ccfb4a1024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17693", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T15:31:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e282c384-e672-4e12-b4bc-95ccfb4a1024/export"/>
    <published>2020-12-09T15:31:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/99030deb-7723-4245-ba76-5a6459f7523a/export</id>
    <title>99030deb-7723-4245-ba76-5a6459f7523a</title>
    <updated>2026-05-05T07:13:03.723578+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "99030deb-7723-4245-ba76-5a6459f7523a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17712", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T16:02:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/99030deb-7723-4245-ba76-5a6459f7523a/export"/>
    <published>2020-12-09T16:02:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4fcd42e-da00-4f9a-89d7-c974748c6e8d/export</id>
    <title>e4fcd42e-da00-4f9a-89d7-c974748c6e8d</title>
    <updated>2026-05-05T07:13:03.723492+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e4fcd42e-da00-4f9a-89d7-c974748c6e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17731", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T16:05:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4fcd42e-da00-4f9a-89d7-c974748c6e8d/export"/>
    <published>2020-12-09T16:05:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/550511ce-f52f-4242-90e6-e768912c463c/export</id>
    <title>550511ce-f52f-4242-90e6-e768912c463c</title>
    <updated>2026-05-05T07:13:03.723411+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "550511ce-f52f-4242-90e6-e768912c463c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17750", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T16:22:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/550511ce-f52f-4242-90e6-e768912c463c/export"/>
    <published>2020-12-09T16:22:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a372366f-93b9-49bb-b475-7d89381f7fcc/export</id>
    <title>a372366f-93b9-49bb-b475-7d89381f7fcc</title>
    <updated>2026-05-05T07:13:03.723330+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a372366f-93b9-49bb-b475-7d89381f7fcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17770", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T16:25:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a372366f-93b9-49bb-b475-7d89381f7fcc/export"/>
    <published>2020-12-09T16:25:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b52df5d3-a1b5-4f85-8b44-ce34f330deee/export</id>
    <title>b52df5d3-a1b5-4f85-8b44-ce34f330deee</title>
    <updated>2026-05-05T07:13:03.723246+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b52df5d3-a1b5-4f85-8b44-ce34f330deee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17789", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T16:33:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b52df5d3-a1b5-4f85-8b44-ce34f330deee/export"/>
    <published>2020-12-09T16:33:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/faa1979d-557e-4020-8737-0c3d77c2623b/export</id>
    <title>faa1979d-557e-4020-8737-0c3d77c2623b</title>
    <updated>2026-05-05T07:13:03.723162+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "faa1979d-557e-4020-8737-0c3d77c2623b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17809", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T17:25:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/faa1979d-557e-4020-8737-0c3d77c2623b/export"/>
    <published>2020-12-09T17:25:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c8a62cf5-5ba5-46c9-8831-9cf76b5aaf26/export</id>
    <title>c8a62cf5-5ba5-46c9-8831-9cf76b5aaf26</title>
    <updated>2026-05-05T07:13:03.723075+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c8a62cf5-5ba5-46c9-8831-9cf76b5aaf26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17828", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:02:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c8a62cf5-5ba5-46c9-8831-9cf76b5aaf26/export"/>
    <published>2020-12-09T18:02:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d489773-cc46-4510-92f7-013eb2111757/export</id>
    <title>4d489773-cc46-4510-92f7-013eb2111757</title>
    <updated>2026-05-05T07:13:03.722951+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d489773-cc46-4510-92f7-013eb2111757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17847", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:05:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d489773-cc46-4510-92f7-013eb2111757/export"/>
    <published>2020-12-09T18:05:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/26c1fdff-0edd-4b1d-8799-ab9e067e9e2b/export</id>
    <title>26c1fdff-0edd-4b1d-8799-ab9e067e9e2b</title>
    <updated>2026-05-05T07:13:03.720101+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "26c1fdff-0edd-4b1d-8799-ab9e067e9e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25627", "type": "seen", "source": "https://t.me/cibsecurity/17867", "content": "\u203c CVE-2020-25627 \u203c\n\nThe moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T18:25:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/26c1fdff-0edd-4b1d-8799-ab9e067e9e2b/export"/>
    <published>2020-12-09T18:25:03+00:00</published>
  </entry>
</feed>
