<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:24:18.154380+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/46d59999-d523-466e-b0c0-5159a098a763/export</id>
    <title>46d59999-d523-466e-b0c0-5159a098a763</title>
    <updated>2026-05-06T18:24:18.531011+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "46d59999-d523-466e-b0c0-5159a098a763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/cibsecurity/58484", "content": "\u203c CVE-2023-22232 \u203c\n\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-18T00:13:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/46d59999-d523-466e-b0c0-5159a098a763/export"/>
    <published>2023-02-18T00:13:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ffeda214-7312-4929-9a13-3ab817bb3b09/export</id>
    <title>ffeda214-7312-4929-9a13-3ab817bb3b09</title>
    <updated>2026-05-06T18:24:18.530712+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ffeda214-7312-4929-9a13-3ab817bb3b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/arpsyndicate/1827", "content": "#ExploitObserverAlert\n\nCVE-2023-22232\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-22232. Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.096260000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-16T14:29:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ffeda214-7312-4929-9a13-3ab817bb3b09/export"/>
    <published>2023-12-16T14:29:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf/export</id>
    <title>0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf</title>
    <updated>2026-05-06T18:24:18.530396+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/codeb0ss/1373", "content": "https://nvd.nist.gov/vuln/detail/CVE-2023-22232", "creation_timestamp": "2024-02-12T22:31:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf/export"/>
    <published>2024-02-12T22:31:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cef48afd-340f-4411-b233-04603d2ff7be/export</id>
    <title>cef48afd-340f-4411-b233-04603d2ff7be</title>
    <updated>2026-05-06T18:24:18.529967+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cef48afd-340f-4411-b233-04603d2ff7be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1374", "content": "", "creation_timestamp": "2024-02-12T22:31:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cef48afd-340f-4411-b233-04603d2ff7be/export"/>
    <published>2024-02-12T22:31:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cc679b57-3998-40ba-88d0-1ac555348264/export</id>
    <title>cc679b57-3998-40ba-88d0-1ac555348264</title>
    <updated>2026-05-06T18:24:18.525007+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cc679b57-3998-40ba-88d0-1ac555348264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1187", "content": "CVE-2023-22232\n\nDescription\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nTemplate: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml\n\nCVE-2023-22232\n\n\u062a\u0648\u0636\u06cc\u062d\u0627\u062a:\n\u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc 11.4.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) \u0648 12.1.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) Adobe Connect \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062f\u0648\u0631 \u0632\u062f\u0646 \u0648\u06cc\u0698\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0648\u062f. \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0631\u0627\u06cc \u062a\u0627\u062b\u06cc\u0631 \u0628\u0631 \u062a\u0645\u0627\u0645\u06cc\u062a \u06cc\u06a9 \u0648\u06cc\u0698\u06af\u06cc \u062c\u0632\u0626\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f. \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 \u0646\u062f\u0627\u0631\u062f.\n\n\u0627\u0644\u06af\u0648: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml", "creation_timestamp": "2024-06-26T11:36:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cc679b57-3998-40ba-88d0-1ac555348264/export"/>
    <published>2024-06-26T11:36:28+00:00</published>
  </entry>
</feed>
