<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T00:22:28.201353+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bdbd9ca-0a5b-425f-af6d-2feb3b141a73/export</id>
    <title>0bdbd9ca-0a5b-425f-af6d-2feb3b141a73</title>
    <updated>2026-05-11T00:22:28.567935+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bdbd9ca-0a5b-425f-af6d-2feb3b141a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25479", "type": "seen", "source": "https://t.me/cibsecurity/62804", "content": "\u203c CVE-2023-25479 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Podlove Podlove Subscribe button plugin &amp;lt;=\u00c2\u00a01.3.7 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-25T16:25:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bdbd9ca-0a5b-425f-af6d-2feb3b141a73/export"/>
    <published>2023-04-25T16:25:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0b56a9d-0f0d-4604-a60f-8ff8daf6f397/export</id>
    <title>e0b56a9d-0f0d-4604-a60f-8ff8daf6f397</title>
    <updated>2026-05-11T00:22:28.567848+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0b56a9d-0f0d-4604-a60f-8ff8daf6f397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25472", "type": "seen", "source": "https://t.me/cibsecurity/64621", "content": "\u203c CVE-2023-25472 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin &amp;lt;=\u00c2\u00a03.8.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-23T16:25:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0b56a9d-0f0d-4604-a60f-8ff8daf6f397/export"/>
    <published>2023-05-23T16:25:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/af8c1fb3-604f-472b-93a5-abb9f1eb382f/export</id>
    <title>af8c1fb3-604f-472b-93a5-abb9f1eb382f</title>
    <updated>2026-05-11T00:22:28.567764+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "af8c1fb3-604f-472b-93a5-abb9f1eb382f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25474", "type": "seen", "source": "https://t.me/cibsecurity/64642", "content": "\u203c CVE-2023-25474 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Csaba Kissi About Me 3000 widget plugin &amp;lt;=\u00c2\u00a02.2.6 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-23T20:26:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/af8c1fb3-604f-472b-93a5-abb9f1eb382f/export"/>
    <published>2023-05-23T20:26:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/29e83333-364f-4c98-b7b0-d8f3e0da465a/export</id>
    <title>29e83333-364f-4c98-b7b0-d8f3e0da465a</title>
    <updated>2026-05-11T00:22:28.567674+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "29e83333-364f-4c98-b7b0-d8f3e0da465a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25473", "type": "seen", "source": "https://t.me/cibsecurity/66891", "content": "\u203c CVE-2023-25473 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Miro Mannino Flickr Justified Gallery plugin &amp;lt;=\u00c2\u00a03.5 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T16:31:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/29e83333-364f-4c98-b7b0-d8f3e0da465a/export"/>
    <published>2023-07-18T16:31:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d1733e22-194f-4b9c-b8b1-e5265b3bcde8/export</id>
    <title>d1733e22-194f-4b9c-b8b1-e5265b3bcde8</title>
    <updated>2026-05-11T00:22:28.567519+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d1733e22-194f-4b9c-b8b1-e5265b3bcde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25475", "type": "seen", "source": "https://t.me/cibsecurity/66895", "content": "\u203c CVE-2023-25475 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin &amp;lt;=\u00c2\u00a04.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T16:31:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d1733e22-194f-4b9c-b8b1-e5265b3bcde8/export"/>
    <published>2023-07-18T16:31:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/10a9ace7-e08b-4b2a-9659-c143e9f1c553/export</id>
    <title>10a9ace7-e08b-4b2a-9659-c143e9f1c553</title>
    <updated>2026-05-11T00:22:28.564670+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "10a9ace7-e08b-4b2a-9659-c143e9f1c553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25476", "type": "seen", "source": "https://t.me/cibsecurity/72490", "content": "\u203c CVE-2023-25476 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ezoic AmpedSense \u00e2\u20ac\u201c AdSense Split Tester plugin &amp;lt;=\u00c2\u00a04.68 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T12:46:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/10a9ace7-e08b-4b2a-9659-c143e9f1c553/export"/>
    <published>2023-10-18T12:46:44+00:00</published>
  </entry>
</feed>
