<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T15:33:21.748760+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/620f29d0-2445-48c4-a95e-620b6e53775b/export</id>
    <title>620f29d0-2445-48c4-a95e-620b6e53775b</title>
    <updated>2026-05-09T15:33:22.065967+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "620f29d0-2445-48c4-a95e-620b6e53775b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35976", "type": "seen", "source": "https://t.me/cibsecurity/28660", "content": "\u203c CVE-2021-35976 \u203c\n\nThe feature to preview a website in Plesk Obsidian 18.0.0 through 18.0.32 on Linux is vulnerable to reflected XSS via the /plesk-site-preview/ PATH, aka PFSI-62467. The attacker could execute JavaScript code in the victim\u00e2\u20ac\u2122s browser by using the link to preview sites hosted on the server. Authentication is not required to exploit the vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-10T16:30:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/620f29d0-2445-48c4-a95e-620b6e53775b/export"/>
    <published>2021-09-10T16:30:38+00:00</published>
  </entry>
</feed>
