<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T06:26:17.171407+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6201821a-edaa-4840-b704-7439bac681e4/export</id>
    <title>6201821a-edaa-4840-b704-7439bac681e4</title>
    <updated>2026-05-08T06:26:17.585823+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6201821a-edaa-4840-b704-7439bac681e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-14724", "type": "seen", "source": "https://t.me/cibsecurity/3261", "content": "ATENTION\u203c New - CVE-2018-14724\n\nIn the Ban List plugin 1.0 for MyBB, any forum user with mod privileges can ban users and input an XSS payload into the ban reason, which is executed on the bans.php page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-03-21T19:26:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6201821a-edaa-4840-b704-7439bac681e4/export"/>
    <published>2019-03-21T19:26:40+00:00</published>
  </entry>
</feed>
