<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T17:24:46.361241+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5463f3d-0f55-4d26-b08d-344438e074e8/export</id>
    <title>a5463f3d-0f55-4d26-b08d-344438e074e8</title>
    <updated>2026-05-11T17:24:46.662235+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5463f3d-0f55-4d26-b08d-344438e074e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/thebugbountyhunter/7351", "content": "Adobe ColdFusion RCE CVE-2023-26359\n\nhttps://attackerkb.com/topics/1iRdvtUgtW/cve-2023-26359/rapid7-analysis", "creation_timestamp": "2023-05-17T18:51:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5463f3d-0f55-4d26-b08d-344438e074e8/export"/>
    <published>2023-05-17T18:51:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7db45c34-1bea-4e98-becc-53ef37e0b987/export</id>
    <title>7db45c34-1bea-4e98-becc-53ef37e0b987</title>
    <updated>2026-05-11T17:24:46.662156+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7db45c34-1bea-4e98-becc-53ef37e0b987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-08-21T18:10:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7db45c34-1bea-4e98-becc-53ef37e0b987/export"/>
    <published>2023-08-21T18:10:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/641683a4-20cb-4920-8d79-b89960baa503/export</id>
    <title>641683a4-20cb-4920-8d79-b89960baa503</title>
    <updated>2026-05-11T17:24:46.662073+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "641683a4-20cb-4920-8d79-b89960baa503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/thehackernews/3771", "content": "Critical security flaw (CVE-2023-26359) in Adobe ColdFusion added to CISA's catalog of known exploited vulnerabilities. \n \nRead: https://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html \n \nAffects ColdFusion 2018 and 2021. Patched by Adobe in March, but active exploitation evidence is concerning.", "creation_timestamp": "2023-08-22T05:39:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/641683a4-20cb-4920-8d79-b89960baa503/export"/>
    <published>2023-08-22T05:39:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03292cbd-9242-42f2-95c0-0e0b27bc9b24/export</id>
    <title>03292cbd-9242-42f2-95c0-0e0b27bc9b24</title>
    <updated>2026-05-11T17:24:46.661991+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03292cbd-9242-42f2-95c0-0e0b27bc9b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/558", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631 \n\n\u062b\u063a\u0631\u0629 \u0623\u0645\u0627\u0646 \u062d\u0631\u062c\u0629 (CVE-2023-26359) \u0641\u064a Adobe ColdFusion \u062a\u0645\u062a \u0625\u0636\u0627\u0641\u062a\u0647\u0627 \u0625\u0644\u0649 \u0641\u0647\u0631\u0633 CISA \u0644\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627.\n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-08-22T07:17:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03292cbd-9242-42f2-95c0-0e0b27bc9b24/export"/>
    <published>2023-08-22T07:17:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/51fb57b1-d957-4524-b987-359881dd9b5a/export</id>
    <title>51fb57b1-d957-4524-b987-359881dd9b5a</title>
    <updated>2026-05-11T17:24:46.661902+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "51fb57b1-d957-4524-b987-359881dd9b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/KomunitiSiber/685", "content": "Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog\nhttps://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has\u00a0added\u00a0a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe vulnerability, cataloged as\u00a0CVE-2023-26359\u00a0(CVSS score: 9.8), relates to a deserialization flaw present in Adobe ColdFusion 2018 (Update 15 and earlier) and ColdFusion 2021 (", "creation_timestamp": "2023-08-22T07:19:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/51fb57b1-d957-4524-b987-359881dd9b5a/export"/>
    <published>2023-08-22T07:19:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38259d74-a4e2-4d12-b746-365816100f2d/export</id>
    <title>38259d74-a4e2-4d12-b746-365816100f2d</title>
    <updated>2026-05-11T17:24:46.661810+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38259d74-a4e2-4d12-b746-365816100f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "Telegram/VnNTtyy2npF0CtTntnVyvzAJ1oW5ItcL1tiJ9G0Xzen4Fw", "content": "", "creation_timestamp": "2023-08-22T07:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38259d74-a4e2-4d12-b746-365816100f2d/export"/>
    <published>2023-08-22T07:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca380ac3-f36b-43b8-8638-dceb183486e0/export</id>
    <title>ca380ac3-f36b-43b8-8638-dceb183486e0</title>
    <updated>2026-05-11T17:24:46.661717+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca380ac3-f36b-43b8-8638-dceb183486e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/arpsyndicate/953", "content": "#ExploitObserverAlert\n\nCVE-2023-26359\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-26359. Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.563320000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T14:22:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca380ac3-f36b-43b8-8638-dceb183486e0/export"/>
    <published>2023-12-03T14:22:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7419e72-2642-4f05-8b9c-aa3823b98e3f/export</id>
    <title>c7419e72-2642-4f05-8b9c-aa3823b98e3f</title>
    <updated>2026-05-11T17:24:46.661609+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7419e72-2642-4f05-8b9c-aa3823b98e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971869", "content": "", "creation_timestamp": "2024-12-24T20:35:02.411398Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7419e72-2642-4f05-8b9c-aa3823b98e3f/export"/>
    <published>2024-12-24T20:35:02.411398+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef7fd5e4-619b-4a85-8cc3-574134ad1edc/export</id>
    <title>ef7fd5e4-619b-4a85-8cc3-574134ad1edc</title>
    <updated>2026-05-11T17:24:46.660774+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef7fd5e4-619b-4a85-8cc3-574134ad1edc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef7fd5e4-619b-4a85-8cc3-574134ad1edc/export"/>
    <published>2025-02-23T02:10:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed9fd404-a188-42d3-b0f4-74e59f63e24b/export</id>
    <title>ed9fd404-a188-42d3-b0f4-74e59f63e24b</title>
    <updated>2026-05-11T17:24:46.659180+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://vulnerability.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "ed9fd404-a188-42d3-b0f4-74e59f63e24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2cf50a8b-557f-41df-9110-8c80dee31012", "content": "", "creation_timestamp": "2026-02-02T12:26:53.641725Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed9fd404-a188-42d3-b0f4-74e59f63e24b/export"/>
    <published>2026-02-02T12:26:53.641725+00:00</published>
  </entry>
</feed>
