<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T12:57:58.587403+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634/export</id>
    <title>d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634</title>
    <updated>2026-05-10T12:57:58.994466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0376", "type": "seen", "source": "https://t.me/cibsecurity/43547", "content": "\u203c CVE-2022-0376 \u203c\n\nThe User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-30T12:18:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634/export"/>
    <published>2022-05-30T12:18:12+00:00</published>
  </entry>
</feed>
