<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:43:34.293078+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61820483-b578-4a21-91a7-e96ae9c94b08/export</id>
    <title>61820483-b578-4a21-91a7-e96ae9c94b08</title>
    <updated>2026-05-04T13:43:35.296019+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61820483-b578-4a21-91a7-e96ae9c94b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42426", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5190", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aRepository for CVE-2023-42426 vulnerability. \nURL\uff1ahttps://github.com/b0marek/CVE-2023-42426\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-24T12:30:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61820483-b578-4a21-91a7-e96ae9c94b08/export"/>
    <published>2023-09-24T12:30:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f04cfdef-a784-4df4-9e5a-a8937d6b7d9d/export</id>
    <title>f04cfdef-a784-4df4-9e5a-a8937d6b7d9d</title>
    <updated>2026-05-04T13:43:35.289593+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f04cfdef-a784-4df4-9e5a-a8937d6b7d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42426", "type": "seen", "source": "https://t.me/cibsecurity/71023", "content": "\u203c CVE-2023-42426 \u203c\n\nCross-site scripting (XSS) vulnerability in Froala Froala Editor v.4.1.1 allows remote attackers to execute arbitrary code via the 'Insert link' parameter in the 'Insert Image' component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-26T00:34:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f04cfdef-a784-4df4-9e5a-a8937d6b7d9d/export"/>
    <published>2023-09-26T00:34:36+00:00</published>
  </entry>
</feed>
