<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:36:15.881819+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5dc4bc8-ec15-4f3f-81df-2e100050e01d/export</id>
    <title>e5dc4bc8-ec15-4f3f-81df-2e100050e01d</title>
    <updated>2026-05-04T16:36:16.215464+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5dc4bc8-ec15-4f3f-81df-2e100050e01d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27423", "type": "seen", "source": "https://t.me/cibsecurity/64380", "content": "\u203c CVE-2023-27423 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Ramon Fincken Auto Prune Posts plugin &amp;lt;=\u00c2\u00a01.8.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T14:32:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5dc4bc8-ec15-4f3f-81df-2e100050e01d/export"/>
    <published>2023-05-18T14:32:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4c0ba7f-871e-43ff-b40d-71bf9f9bf5a7/export</id>
    <title>e4c0ba7f-871e-43ff-b40d-71bf9f9bf5a7</title>
    <updated>2026-05-04T16:36:16.215351+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e4c0ba7f-871e-43ff-b40d-71bf9f9bf5a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27427", "type": "seen", "source": "https://t.me/cibsecurity/65454", "content": "\u203c CVE-2023-27427 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NTZApps CRM Memberships plugin &amp;lt;=\u00c2\u00a01.6 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-23T16:43:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4c0ba7f-871e-43ff-b40d-71bf9f9bf5a7/export"/>
    <published>2023-06-23T16:43:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f98acf22-86fd-43e9-a6b8-e36594891e5a/export</id>
    <title>f98acf22-86fd-43e9-a6b8-e36594891e5a</title>
    <updated>2026-05-04T16:36:16.215224+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f98acf22-86fd-43e9-a6b8-e36594891e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2742", "type": "seen", "source": "https://t.me/kasraone_com/321", "content": "CVE-2023-2742\n\n\u0627\u0641\u0632\u0648\u0646\u0647 \u0648\u0631\u062f\u067e\u0631\u0633 AI ChatBot \u0642\u0628\u0644 \u0627\u0632 \u0646\u0633\u062e\u0647 4.5.5 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u062a\u0635\u0641\u06cc\u0647 \u0648 \u0641\u0631\u0627\u0631 \u0646\u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u06a9\u0647 \u0628\u0627\u0639\u062b \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0627\u0644\u0627 \u0645\u0627\u0646\u0646\u062f \u0645\u062f\u06cc\u0631\u0627\u0646 \u0628\u062a\u0648\u0627\u0646\u0646\u062f \u062d\u0645\u0644\u0627\u062a Cross-Site Scripting \u0631\u0627 \u0627\u0646\u062c\u0627\u0645 \u062f\u0647\u0646\u062f\u060c \u062d\u062a\u06cc \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u0642\u0627\u0628\u0644\u06cc\u062a unfiltered_html \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u0634\u062f\u0647 \u0627\u0633\u062a.", "creation_timestamp": "2023-06-27T13:19:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f98acf22-86fd-43e9-a6b8-e36594891e5a/export"/>
    <published>2023-06-27T13:19:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f4432b88-524d-4e7f-9df7-4bcd002c038a/export</id>
    <title>f4432b88-524d-4e7f-9df7-4bcd002c038a</title>
    <updated>2026-05-04T16:36:16.215063+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f4432b88-524d-4e7f-9df7-4bcd002c038a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27424", "type": "seen", "source": "https://t.me/cibsecurity/66810", "content": "\u203c CVE-2023-27424 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Korol Yuriy aka Shra Inactive User Deleter plugin &amp;lt;=\u00c2\u00a01.59 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T16:35:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f4432b88-524d-4e7f-9df7-4bcd002c038a/export"/>
    <published>2023-07-17T16:35:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c9cb25b-7a46-404e-8c22-45e1f7a175b0/export</id>
    <title>8c9cb25b-7a46-404e-8c22-45e1f7a175b0</title>
    <updated>2026-05-04T16:36:16.212534+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c9cb25b-7a46-404e-8c22-45e1f7a175b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27426", "type": "seen", "source": "https://t.me/cibsecurity/69424", "content": "\u203c CVE-2023-27426 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Notifyvisitors NotifyVisitors plugin &amp;lt;=\u00c2\u00a01.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T16:12:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c9cb25b-7a46-404e-8c22-45e1f7a175b0/export"/>
    <published>2023-08-30T16:12:22+00:00</published>
  </entry>
</feed>
