<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:06:30.935635+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1561c97f-eb1d-4e60-8cfb-35a2588fa167/export</id>
    <title>1561c97f-eb1d-4e60-8cfb-35a2588fa167</title>
    <updated>2026-05-06T18:06:31.302316+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1561c97f-eb1d-4e60-8cfb-35a2588fa167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27037", "type": "seen", "source": "https://t.me/cibsecurity/60143", "content": "\u203c CVE-2023-27037 \u203c\n\nQibosoft QiboCMS v7 was discovered to contain a remote code execution (RCE) vulnerability via the Get_Title function at label_set_rs.php\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-16T17:30:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1561c97f-eb1d-4e60-8cfb-35a2588fa167/export"/>
    <published>2023-03-16T17:30:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8898353d-3f88-4b19-9c3d-15dac3fa0582/export</id>
    <title>8898353d-3f88-4b19-9c3d-15dac3fa0582</title>
    <updated>2026-05-06T18:06:31.302238+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8898353d-3f88-4b19-9c3d-15dac3fa0582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27034", "type": "seen", "source": "https://t.me/cibsecurity/60632", "content": "\u203c CVE-2023-27034 \u203c\n\nPrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T01:36:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8898353d-3f88-4b19-9c3d-15dac3fa0582/export"/>
    <published>2023-03-24T01:36:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cef076f9-3668-4e5c-bb8c-c51b756eaa69/export</id>
    <title>cef076f9-3668-4e5c-bb8c-c51b756eaa69</title>
    <updated>2026-05-06T18:06:31.302158+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cef076f9-3668-4e5c-bb8c-c51b756eaa69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27033", "type": "seen", "source": "https://t.me/cibsecurity/61702", "content": "\u203c CVE-2023-27033 \u203c\n\nPrestashop cdesigner v3.1.3 to v3.1.8 was discovered to contain a code injection vulnerability via the component CdesignerSaverotateModuleFrontController::initContent().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-08T00:28:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cef076f9-3668-4e5c-bb8c-c51b756eaa69/export"/>
    <published>2023-04-08T00:28:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2ef98596-0be8-4a61-a7b2-dff0b6dbb0bf/export</id>
    <title>2ef98596-0be8-4a61-a7b2-dff0b6dbb0bf</title>
    <updated>2026-05-06T18:06:31.302047+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2ef98596-0be8-4a61-a7b2-dff0b6dbb0bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2703", "type": "seen", "source": "https://t.me/cibsecurity/64659", "content": "\u203c CVE-2023-2703 \u203c\n\nExposure of Private Personal Information to an Unauthorized Actor vulnerability in Finex Media Competition Management System allows Retrieve Embedded Sensitive Data, Collect Data as Provided by Users.This issue affects Competition Management System: before 23.07.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T00:40:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2ef98596-0be8-4a61-a7b2-dff0b6dbb0bf/export"/>
    <published>2023-05-24T00:40:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6397d017-a796-46e3-ac75-57d3eba77858/export</id>
    <title>6397d017-a796-46e3-ac75-57d3eba77858</title>
    <updated>2026-05-06T18:06:31.301928+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6397d017-a796-46e3-ac75-57d3eba77858", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27034", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1101", "content": "", "creation_timestamp": "2023-09-03T03:53:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6397d017-a796-46e3-ac75-57d3eba77858/export"/>
    <published>2023-09-03T03:53:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/84e0cd47-8a46-4a0d-9379-5dfae642f8bf/export</id>
    <title>84e0cd47-8a46-4a0d-9379-5dfae642f8bf</title>
    <updated>2026-05-06T18:06:31.301788+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "84e0cd47-8a46-4a0d-9379-5dfae642f8bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2703", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2164", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2703\n\ud83d\udd39 Description: Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Finex Media Competition Management System allows Retrieve Embedded Sensitive Data, Collect Data as Provided by Users.This issue affects Competition Management System: before 23.07.\n\n\n\ud83d\udccf Published: 2023-05-23T19:19:47.883Z\n\ud83d\udccf Modified: 2025-01-17T16:11:59.898Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-23-0283", "creation_timestamp": "2025-01-17T16:57:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/84e0cd47-8a46-4a0d-9379-5dfae642f8bf/export"/>
    <published>2025-01-17T16:57:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a476517-977a-4014-8135-42e5be152681/export</id>
    <title>8a476517-977a-4014-8135-42e5be152681</title>
    <updated>2026-05-06T18:06:31.301613+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a476517-977a-4014-8135-42e5be152681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27032", "type": "seen", "source": "Telegram/uwW0NFViBWsTzKgUFylilHVWHsBYQEXMayxOSh6wr-tVNt2l", "content": "", "creation_timestamp": "2025-02-14T10:00:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a476517-977a-4014-8135-42e5be152681/export"/>
    <published>2025-02-14T10:00:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/62332ea6-205b-4055-b802-98d77a508157/export</id>
    <title>62332ea6-205b-4055-b802-98d77a508157</title>
    <updated>2026-05-06T18:06:31.299608+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "62332ea6-205b-4055-b802-98d77a508157", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27032", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mf5y3shlnf2b", "content": "", "creation_timestamp": "2026-02-18T21:03:06.331807Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/62332ea6-205b-4055-b802-98d77a508157/export"/>
    <published>2026-02-18T21:03:06.331807+00:00</published>
  </entry>
</feed>
