<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:39:47.776381+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e437ac1a-7119-4507-84ac-3c7d6f925705/export</id>
    <title>e437ac1a-7119-4507-84ac-3c7d6f925705</title>
    <updated>2026-05-06T10:39:48.112390+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e437ac1a-7119-4507-84ac-3c7d6f925705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0602", "type": "seen", "source": "https://t.me/cibsecurity/67440", "content": "\u203c CVE-2023-0602 \u203c\n\nThe Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-31T14:37:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e437ac1a-7119-4507-84ac-3c7d6f925705/export"/>
    <published>2023-07-31T14:37:36+00:00</published>
  </entry>
</feed>
