<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:48:25.758498+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6bc3f30-68d4-4c96-897e-9a016de55a77/export</id>
    <title>a6bc3f30-68d4-4c96-897e-9a016de55a77</title>
    <updated>2026-05-04T14:48:26.074882+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6bc3f30-68d4-4c96-897e-9a016de55a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25542", "type": "seen", "source": "https://t.me/cibsecurity/61527", "content": "\u203c CVE-2023-25542 \u203c\n\nDell Trusted Device Agent, versions prior to 5.3.0, contain(s) an improper installation permissions vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to escalated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-06T12:26:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6bc3f30-68d4-4c96-897e-9a016de55a77/export"/>
    <published>2023-04-06T12:26:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fcd5208c-9cbd-461c-8527-f0d481d16393/export</id>
    <title>fcd5208c-9cbd-461c-8527-f0d481d16393</title>
    <updated>2026-05-04T14:48:26.074796+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fcd5208c-9cbd-461c-8527-f0d481d16393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25548", "type": "seen", "source": "https://t.me/cibsecurity/62386", "content": "\u203c CVE-2023-25548 \u203c\n\nA CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T00:29:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fcd5208c-9cbd-461c-8527-f0d481d16393/export"/>
    <published>2023-04-19T00:29:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4307960f-1a5c-49f2-b688-b93506e2e451/export</id>
    <title>4307960f-1a5c-49f2-b688-b93506e2e451</title>
    <updated>2026-05-04T14:48:26.074723+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4307960f-1a5c-49f2-b688-b93506e2e451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25547", "type": "seen", "source": "https://t.me/cibsecurity/62398", "content": "\u203c CVE-2023-25547 \u203c\n\nA CWE-863: Incorrect Authorization vulnerability exists that could allow remote code execution on upload and install packages when a hacker is using a low privileged user account. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T00:29:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4307960f-1a5c-49f2-b688-b93506e2e451/export"/>
    <published>2023-04-19T00:29:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b1883353-3818-4e32-b174-404723139aee/export</id>
    <title>b1883353-3818-4e32-b174-404723139aee</title>
    <updated>2026-05-04T14:48:26.074644+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b1883353-3818-4e32-b174-404723139aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2554", "type": "seen", "source": "https://t.me/cibsecurity/63398", "content": "\u203c CVE-2023-2554 \u203c\n\nExternal Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-06T00:25:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b1883353-3818-4e32-b174-404723139aee/export"/>
    <published>2023-05-06T00:25:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9da25209-a611-4b7f-b0cc-2b7ccc2056ce/export</id>
    <title>9da25209-a611-4b7f-b0cc-2b7ccc2056ce</title>
    <updated>2026-05-04T14:48:26.074569+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9da25209-a611-4b7f-b0cc-2b7ccc2056ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25543", "type": "seen", "source": "https://t.me/ctinow/179825", "content": "https://ift.tt/7TCXeO5\nCVE-2023-25543", "creation_timestamp": "2024-02-06T08:26:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9da25209-a611-4b7f-b0cc-2b7ccc2056ce/export"/>
    <published>2024-02-06T08:26:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb2f84c2-811a-4e55-96f0-0c103fb1857d/export</id>
    <title>cb2f84c2-811a-4e55-96f0-0c103fb1857d</title>
    <updated>2026-05-04T14:48:26.074470+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb2f84c2-811a-4e55-96f0-0c103fb1857d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25548", "type": "seen", "source": "https://t.me/ics_cert/714", "content": "\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0638\u0627\u0631\u062a \u0628\u0631 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u062d\u06cc\u0627\u062a\u06cc StruxureWare Data Center Expert \u0628\u0647 \u0646\u0642\u0635\u200c\u0647\u0627\u06cc \u0631\u0648\u06cc\u0647 \u0645\u062c\u0648\u0632 \u0645\u0631\u0628\u0648\u0637 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f\n\nBDU: 2023-01103\nCVE-2023-25548\n\n\u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc \u0648 \u062a\u062d\u0631\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0639\u0645\u0627\u0644 \u0634\u062f\u0647\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0645\u0633\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062d\u0633\u0627\u0628 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0634\u062f\u0647\n- \u0628\u0647 \u062d\u062f\u0627\u0642\u0644 \u0631\u0633\u0627\u0646\u062f\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631.\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0647 \u0645\u0646\u0638\u0648\u0631 \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0635\u0646\u0639\u062a\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\nhttps://download.schneider-electric.com/files\u061fp_doc_ref=sevd-2023-045-02&amp;amp;p_endoctype+ security+safety+notice&amp;amp;p_file_name=sevd-2023-045-045-02.02.pdf=2.136363631852\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2024-07-06T04:18:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb2f84c2-811a-4e55-96f0-0c103fb1857d/export"/>
    <published>2024-07-06T04:18:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f888dbd1-56b0-430a-bfb5-d9f533402193/export</id>
    <title>f888dbd1-56b0-430a-bfb5-d9f533402193</title>
    <updated>2026-05-04T14:48:26.074389+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f888dbd1-56b0-430a-bfb5-d9f533402193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25546", "type": "seen", "source": "https://t.me/cvedetector/5749", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-25546 - Intel UEFI Firmware Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-25546 \nPublished : Sept. 16, 2024, 5:15 p.m. | 14\u00a0minutes ago \nDescription : Out-of-bounds read in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access. \nSeverity: 2.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T19:32:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f888dbd1-56b0-430a-bfb5-d9f533402193/export"/>
    <published>2024-09-16T19:32:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c55f1d4a-dc1c-4d76-b8c7-d2454f3ac812/export</id>
    <title>c55f1d4a-dc1c-4d76-b8c7-d2454f3ac812</title>
    <updated>2026-05-04T14:48:26.074304+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c55f1d4a-dc1c-4d76-b8c7-d2454f3ac812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25548", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6259", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25548\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nA CWE-863: Incorrect Authorization vulnerability exists that could allow access to device\ncredentials on specific DCE endpoints not being properly secured when a hacker is using a low\nprivileged user. \n\n Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)\n\n\n\ud83d\udccf Published: 2023-04-18T20:32:42.718Z\n\ud83d\udccf Modified: 2025-03-03T19:17:53.318Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&amp;amp;p_enDocType=Security+and+Safety+Notice&amp;amp;p_File_Name=SEVD-2023-045-02.pdf", "creation_timestamp": "2025-03-03T19:30:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c55f1d4a-dc1c-4d76-b8c7-d2454f3ac812/export"/>
    <published>2025-03-03T19:30:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/edd2674a-4c63-470e-95eb-73f5ed1e4f69/export</id>
    <title>edd2674a-4c63-470e-95eb-73f5ed1e4f69</title>
    <updated>2026-05-04T14:48:26.074180+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "edd2674a-4c63-470e-95eb-73f5ed1e4f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6262", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25549\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \n\n\n\n\n\n\nA CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that\nallows for remote code execution when using a parameter of the DCE network settings\nendpoint. \n\n\n\n\n \n\n \n\n Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)\n\n\n\ud83d\udccf Published: 2023-04-18T20:35:42.008Z\n\ud83d\udccf Modified: 2025-03-03T19:14:28.433Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&amp;amp;p_enDocType=Security+and+Safety+Notice&amp;amp;p_File_Name=SEVD-2023-045-02.pdf", "creation_timestamp": "2025-03-03T19:30:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/edd2674a-4c63-470e-95eb-73f5ed1e4f69/export"/>
    <published>2025-03-03T19:30:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/069525b5-5035-4be3-8357-6db284ad71cd/export</id>
    <title>069525b5-5035-4be3-8357-6db284ad71cd</title>
    <updated>2026-05-04T14:48:26.071007+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "069525b5-5035-4be3-8357-6db284ad71cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25540", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25540\n\ud83d\udd25 CVSS Score: 6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)\n\ud83d\udd39 Description: \nDell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.\n\n\n\ud83d\udccf Published: 2023-02-28T16:30:31.210Z\n\ud83d\udccf Modified: 2025-03-11T14:08:27.428Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000209895/dell-emc-powerscale-onefs-security-updates-for-multiple-security", "creation_timestamp": "2025-03-11T14:39:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/069525b5-5035-4be3-8357-6db284ad71cd/export"/>
    <published>2025-03-11T14:39:59+00:00</published>
  </entry>
</feed>
