<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 07:38:47 +0000</lastBuildDate>
    <item>
      <title>e80821d9-0200-465e-9a28-5204082cb470</title>
      <link>https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export</link>
      <description>{"uuid": "e80821d9-0200-465e-9a28-5204082cb470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29636", "type": "seen", "source": "https://t.me/cibsecurity/63128", "content": "\u203c CVE-2023-29636 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the \"title\" field in the \"blog management\" page due to the the default configuration not using MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:40.000000Z"}</description>
      <content:encoded>{"uuid": "e80821d9-0200-465e-9a28-5204082cb470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29636", "type": "seen", "source": "https://t.me/cibsecurity/63128", "content": "\u203c CVE-2023-29636 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the \"title\" field in the \"blog management\" page due to the the default configuration not using MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:40 +0000</pubDate>
    </item>
  </channel>
</rss>
