<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:19:33.961848+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4820959b-c260-4fb8-9226-8c592f0416e6/export</id>
    <title>4820959b-c260-4fb8-9226-8c592f0416e6</title>
    <updated>2026-05-04T19:19:34.398313+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4820959b-c260-4fb8-9226-8c592f0416e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6037", "type": "seen", "source": "https://t.me/ctinow/161361", "content": "https://ift.tt/lsYywFu\nCVE-2023-6037", "creation_timestamp": "2024-01-01T16:26:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4820959b-c260-4fb8-9226-8c592f0416e6/export"/>
    <published>2024-01-01T16:26:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a40cddf-b41c-459e-989d-1bb7069955db/export</id>
    <title>9a40cddf-b41c-459e-989d-1bb7069955db</title>
    <updated>2026-05-04T19:19:34.398124+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a40cddf-b41c-459e-989d-1bb7069955db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6037", "type": "seen", "source": "https://t.me/cibsecurity/74088", "content": "\u203c\ufe0fCVE-2023-6037\u203c\ufe0f\n\nThe WP TripAdvisor Review Slider WordPress plugin before 11.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored CrossSite Scripting attacks even when the unfilteredhtml capability is disallowed for example in multisite setup\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:30:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a40cddf-b41c-459e-989d-1bb7069955db/export"/>
    <published>2024-01-02T01:30:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd0e780b-ee74-4e75-a9d6-2ef28109ff9c/export</id>
    <title>fd0e780b-ee74-4e75-a9d6-2ef28109ff9c</title>
    <updated>2026-05-04T19:19:34.397898+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd0e780b-ee74-4e75-a9d6-2ef28109ff9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6037", "type": "seen", "source": "https://t.me/ctinow/164557", "content": "https://ift.tt/yQjtKPR\nCVE-2023-6037 Exploit", "creation_timestamp": "2024-01-08T19:16:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd0e780b-ee74-4e75-a9d6-2ef28109ff9c/export"/>
    <published>2024-01-08T19:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4e30bdcb-3b67-4cf7-9dec-c5e2477d53f6/export</id>
    <title>4e30bdcb-3b67-4cf7-9dec-c5e2477d53f6</title>
    <updated>2026-05-04T19:19:34.395319+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4e30bdcb-3b67-4cf7-9dec-c5e2477d53f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6037", "type": "seen", "source": "https://t.me/ctinow/171123", "content": "https://ift.tt/clH3rZS\nCVE-2023-6037 | WP TripAdvisor Review Slider Plugin up to 11.8 on WordPress Setting cross site scripting", "creation_timestamp": "2024-01-22T12:37:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4e30bdcb-3b67-4cf7-9dec-c5e2477d53f6/export"/>
    <published>2024-01-22T12:37:01+00:00</published>
  </entry>
</feed>
