<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:07:22 +0000</lastBuildDate>
    <item>
      <title>6f9c6e66-389e-4f32-a206-3526ae0fe9f8</title>
      <link>https://vulnerability.circl.lu/sighting/6f9c6e66-389e-4f32-a206-3526ae0fe9f8/export</link>
      <description>{"uuid": "6f9c6e66-389e-4f32-a206-3526ae0fe9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26239", "type": "seen", "source": "https://t.me/cibsecurity/16733", "content": "\u203c CVE-2020-26239 \u203c\n\nScratch Addons is a WebExtension that supports both Chrome and Firefox. Scratch Addons before version 1.3.2 is vulnerable to DOM-based XSS. If the victim visited a specific website, the More Links addon of the Scratch Addons extension used incorrect regular expression which caused the HTML-escaped values to be unescaped, leading to XSS. Scratch Addons version 1.3.2 fixes the bug. The extension will be automatically updated by the browser. More Links addon can be disabled via the option of the extension.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-23T22:46:02.000000Z"}</description>
      <content:encoded>{"uuid": "6f9c6e66-389e-4f32-a206-3526ae0fe9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26239", "type": "seen", "source": "https://t.me/cibsecurity/16733", "content": "\u203c CVE-2020-26239 \u203c\n\nScratch Addons is a WebExtension that supports both Chrome and Firefox. Scratch Addons before version 1.3.2 is vulnerable to DOM-based XSS. If the victim visited a specific website, the More Links addon of the Scratch Addons extension used incorrect regular expression which caused the HTML-escaped values to be unescaped, leading to XSS. Scratch Addons version 1.3.2 fixes the bug. The extension will be automatically updated by the browser. More Links addon can be disabled via the option of the extension.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-23T22:46:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6f9c6e66-389e-4f32-a206-3526ae0fe9f8/export</guid>
      <pubDate>Mon, 23 Nov 2020 22:46:02 +0000</pubDate>
    </item>
  </channel>
</rss>
