<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T23:09:52.290452+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b53022bb-848a-4b48-a8c3-35c3efeef6d1/export</id>
    <title>b53022bb-848a-4b48-a8c3-35c3efeef6d1</title>
    <updated>2026-05-04T23:09:52.612241+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b53022bb-848a-4b48-a8c3-35c3efeef6d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49860", "type": "seen", "source": "https://t.me/ctinow/161809", "content": "https://ift.tt/2Vzr563\nCVE-2023-49860 | WP Project Manager Plugin up to 2.6.7 on WordPress cross site scripting", "creation_timestamp": "2024-01-02T15:06:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b53022bb-848a-4b48-a8c3-35c3efeef6d1/export"/>
    <published>2024-01-02T15:06:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b95406dd-93ac-4d71-bd53-f99daa507743/export</id>
    <title>b95406dd-93ac-4d71-bd53-f99daa507743</title>
    <updated>2026-05-04T23:09:52.609495+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b95406dd-93ac-4d71-bd53-f99daa507743", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49860", "type": "seen", "source": "https://t.me/arpsyndicate/2417", "content": "#ExploitObserverAlert\n\nCVE-2023-49860\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49860. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weDevs WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts allows Stored XSS.This issue affects WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts: from n/a through 2.6.7.\n\nFIRST-EPSS: 0.000450000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-04T03:16:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b95406dd-93ac-4d71-bd53-f99daa507743/export"/>
    <published>2024-01-04T03:16:18+00:00</published>
  </entry>
</feed>
