<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:39:34.522362+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/df79526e-5f6e-41e5-adc4-8a2673ffa070/export</id>
    <title>df79526e-5f6e-41e5-adc4-8a2673ffa070</title>
    <updated>2026-05-06T10:39:34.841831+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "df79526e-5f6e-41e5-adc4-8a2673ffa070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7044", "type": "seen", "source": "https://t.me/ctinow/162909", "content": "https://ift.tt/dkvE7Zw\nCVE-2023-7044", "creation_timestamp": "2024-01-04T11:31:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/df79526e-5f6e-41e5-adc4-8a2673ffa070/export"/>
    <published>2024-01-04T11:31:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/026a1e57-2a68-4d41-8a44-622fff3f5936/export</id>
    <title>026a1e57-2a68-4d41-8a44-622fff3f5936</title>
    <updated>2026-05-06T10:39:34.841672+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "026a1e57-2a68-4d41-8a44-622fff3f5936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7044", "type": "seen", "source": "https://t.me/cibsecurity/74401", "content": "\u203c\ufe0fCVE-2023-7044\u203c\ufe0f\n\nThe Essential Addons for Elementor  Best Elementor Templates, Widgets, Kits  WooCommerce Builders plugin for WordPress is vulnerable to Stored CrossSite Scripting via custom ID in all versions up to, and including, 5.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:32:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/026a1e57-2a68-4d41-8a44-622fff3f5936/export"/>
    <published>2024-01-05T01:32:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cae8635c-0a04-4be8-8905-304bcf0dec3e/export</id>
    <title>cae8635c-0a04-4be8-8905-304bcf0dec3e</title>
    <updated>2026-05-06T10:39:34.839482+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cae8635c-0a04-4be8-8905-304bcf0dec3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7044", "type": "seen", "source": "https://t.me/ctinow/172578", "content": "https://ift.tt/Rxy4DFe\nCVE-2023-7044 | wpdevteam Essential Addons for Elementor Plugin up to 5.9.2 on WordPress cross site scripting (ID 3013774)", "creation_timestamp": "2024-01-24T08:41:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cae8635c-0a04-4be8-8905-304bcf0dec3e/export"/>
    <published>2024-01-24T08:41:38+00:00</published>
  </entry>
</feed>
