<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:47:00.303977+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad/export</id>
    <title>5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad</title>
    <updated>2026-05-06T09:47:00.615597+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "https://t.me/cibsecurity/61636", "content": "\u203c CVE-2023-27013 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad/export"/>
    <published>2023-04-07T07:27:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca5c01e5-ceb4-4c9a-8249-2109df599fc8/export</id>
    <title>ca5c01e5-ceb4-4c9a-8249-2109df599fc8</title>
    <updated>2026-05-06T09:47:00.615495+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca5c01e5-ceb4-4c9a-8249-2109df599fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "https://t.me/cibsecurity/61637", "content": "\u203c CVE-2023-27016 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca5c01e5-ceb4-4c9a-8249-2109df599fc8/export"/>
    <published>2023-04-07T07:27:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3305c4c-b9c7-4007-8e0a-47d31ca76de1/export</id>
    <title>f3305c4c-b9c7-4007-8e0a-47d31ca76de1</title>
    <updated>2026-05-06T09:47:00.615393+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3305c4c-b9c7-4007-8e0a-47d31ca76de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27017", "type": "seen", "source": "https://t.me/cibsecurity/61640", "content": "\u203c CVE-2023-27017 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_45DC58 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3305c4c-b9c7-4007-8e0a-47d31ca76de1/export"/>
    <published>2023-04-07T07:27:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30019dea-6529-4676-b008-0c97a5f77a18/export</id>
    <title>30019dea-6529-4676-b008-0c97a5f77a18</title>
    <updated>2026-05-06T09:47:00.615284+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30019dea-6529-4676-b008-0c97a5f77a18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2701", "type": "seen", "source": "https://t.me/cibsecurity/66818", "content": "\u203c CVE-2023-2701 \u203c\n\nThe Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30019dea-6529-4676-b008-0c97a5f77a18/export"/>
    <published>2023-07-17T18:40:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e1a08df-7101-4383-b259-ecae1bc096ae/export</id>
    <title>2e1a08df-7101-4383-b259-ecae1bc096ae</title>
    <updated>2026-05-06T09:47:00.615181+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e1a08df-7101-4383-b259-ecae1bc096ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27019", "type": "seen", "source": "Telegram/5hH5ajtM-oZI8EMttLkpzze1UyaglwRFKGyZ2ZBcuYombhG4", "content": "", "creation_timestamp": "2025-02-14T10:05:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e1a08df-7101-4383-b259-ecae1bc096ae/export"/>
    <published>2025-02-14T10:05:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3fd001b6-3647-4d84-98de-2b9e56644aee/export</id>
    <title>3fd001b6-3647-4d84-98de-2b9e56644aee</title>
    <updated>2026-05-06T09:47:00.615079+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3fd001b6-3647-4d84-98de-2b9e56644aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27012", "type": "seen", "source": "Telegram/YPd9jOc1W5QBJWC4avKUZMxMcGEJ1YmZAhAcR_Lo5OO4fhXc", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3fd001b6-3647-4d84-98de-2b9e56644aee/export"/>
    <published>2025-02-14T10:05:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5f41fdf1-93a3-47f3-b5a6-81135d317305/export</id>
    <title>5f41fdf1-93a3-47f3-b5a6-81135d317305</title>
    <updated>2026-05-06T09:47:00.614794+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5f41fdf1-93a3-47f3-b5a6-81135d317305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "Telegram/oi9pEo4KGGyZPVX_mB9XSRpABw0G6yyvQG1vw7Vw34XYS7cY", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5f41fdf1-93a3-47f3-b5a6-81135d317305/export"/>
    <published>2025-02-14T10:05:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9cfbcb3-6663-42aa-9095-63eea291d9ea/export</id>
    <title>d9cfbcb3-6663-42aa-9095-63eea291d9ea</title>
    <updated>2026-05-06T09:47:00.614686+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9cfbcb3-6663-42aa-9095-63eea291d9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27014", "type": "seen", "source": "Telegram/bqW1OtssH0_6EKpCgn9HzhryrFaFAEjb6quxNe8OLIohZiUq", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9cfbcb3-6663-42aa-9095-63eea291d9ea/export"/>
    <published>2025-02-14T10:05:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d309112c-df6c-489e-900a-e3691bce6663/export</id>
    <title>d309112c-df6c-489e-900a-e3691bce6663</title>
    <updated>2026-05-06T09:47:00.614536+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d309112c-df6c-489e-900a-e3691bce6663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27015", "type": "seen", "source": "Telegram/TzZaJ2iW0TPTDsMBb3CPyz1zWYZ-mqEHTIQQ8jPi9uA4JXXE", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d309112c-df6c-489e-900a-e3691bce6663/export"/>
    <published>2025-02-14T10:05:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/482aabc9-4f85-4218-8ac1-d32ef49aee78/export</id>
    <title>482aabc9-4f85-4218-8ac1-d32ef49aee78</title>
    <updated>2026-05-06T09:47:00.611379+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "482aabc9-4f85-4218-8ac1-d32ef49aee78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "Telegram/ib8gY-Q5HRQUW41-2rJMx_KFZDsIdvLiY1NF5C54imovq6U4", "content": "", "creation_timestamp": "2025-02-14T10:05:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/482aabc9-4f85-4218-8ac1-d32ef49aee78/export"/>
    <published>2025-02-14T10:05:59+00:00</published>
  </entry>
</feed>
