<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 12:57:56 +0000</lastBuildDate>
    <item>
      <title>d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634</title>
      <link>https://vulnerability.circl.lu/sighting/d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634/export</link>
      <description>{"uuid": "d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0376", "type": "seen", "source": "https://t.me/cibsecurity/43547", "content": "\u203c CVE-2022-0376 \u203c\n\nThe User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-30T12:18:12.000000Z"}</description>
      <content:encoded>{"uuid": "d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0376", "type": "seen", "source": "https://t.me/cibsecurity/43547", "content": "\u203c CVE-2022-0376 \u203c\n\nThe User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-30T12:18:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d20c0839-fe2a-4cbe-ab24-fd3ffa1c5634/export</guid>
      <pubDate>Mon, 30 May 2022 12:18:12 +0000</pubDate>
    </item>
  </channel>
</rss>
