<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T12:46:13.306325+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1ee66380-7124-4387-b4d6-d26297f68fad/export</id>
    <title>1ee66380-7124-4387-b4d6-d26297f68fad</title>
    <updated>2026-05-04T12:46:13.636147+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1ee66380-7124-4387-b4d6-d26297f68fad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27620", "type": "seen", "source": "https://t.me/cibsecurity/61676", "content": "\u203c CVE-2023-27620 \u203c\n\nAuth. (contributor+) Stored Cross-site Scripting (XSS) vulnerability in RoboSoft Photo Gallery, Images, Slider in Rbs Image Gallery plugin &amp;lt;= 3.2.12 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T18:28:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1ee66380-7124-4387-b4d6-d26297f68fad/export"/>
    <published>2023-04-07T18:28:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c6c2dfb-f7dc-4a7d-9e04-74e10a4505ce/export</id>
    <title>5c6c2dfb-f7dc-4a7d-9e04-74e10a4505ce</title>
    <updated>2026-05-04T12:46:13.636068+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c6c2dfb-f7dc-4a7d-9e04-74e10a4505ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2762", "type": "seen", "source": "https://t.me/cibsecurity/66476", "content": "\u203c CVE-2023-2762 \u203c\n\nA Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T12:35:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c6c2dfb-f7dc-4a7d-9e04-74e10a4505ce/export"/>
    <published>2023-07-12T12:35:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6b2f2817-1ce3-4e50-a4a3-b6147a643dc3/export</id>
    <title>6b2f2817-1ce3-4e50-a4a3-b6147a643dc3</title>
    <updated>2026-05-04T12:46:13.635991+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6b2f2817-1ce3-4e50-a4a3-b6147a643dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27627", "type": "seen", "source": "https://t.me/cibsecurity/67989", "content": "\u203c CVE-2023-27627 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in eggemplo Woocommerce Email Report plugin &amp;lt;=\u00c2\u00a02.4 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T16:14:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6b2f2817-1ce3-4e50-a4a3-b6147a643dc3/export"/>
    <published>2023-08-08T16:14:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9bcad9eb-6bf7-4b76-b3dd-06fc6218105c/export</id>
    <title>9bcad9eb-6bf7-4b76-b3dd-06fc6218105c</title>
    <updated>2026-05-04T12:46:13.635909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9bcad9eb-6bf7-4b76-b3dd-06fc6218105c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27621", "type": "seen", "source": "https://t.me/cibsecurity/69477", "content": "\u203c CVE-2023-27621 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in MrDemonWolf Livestream Notice plugin &amp;lt;=\u00c2\u00a01.2.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T20:12:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9bcad9eb-6bf7-4b76-b3dd-06fc6218105c/export"/>
    <published>2023-08-30T20:12:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0381a878-2b83-4468-97cf-f79aa3c9273a/export</id>
    <title>0381a878-2b83-4468-97cf-f79aa3c9273a</title>
    <updated>2026-05-04T12:46:13.635805+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0381a878-2b83-4468-97cf-f79aa3c9273a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27624", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-27624.yaml", "content": "", "creation_timestamp": "2025-12-19T03:08:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0381a878-2b83-4468-97cf-f79aa3c9273a/export"/>
    <published>2025-12-19T03:08:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d64a139f-383c-406b-b8a5-7a7562908289/export</id>
    <title>d64a139f-383c-406b-b8a5-7a7562908289</title>
    <updated>2026-05-04T12:46:13.633125+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d64a139f-383c-406b-b8a5-7a7562908289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27624", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3maonj3l2nm22", "content": "", "creation_timestamp": "2025-12-23T21:02:58.694683Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d64a139f-383c-406b-b8a5-7a7562908289/export"/>
    <published>2025-12-23T21:02:58.694683+00:00</published>
  </entry>
</feed>
