<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:45:12.177929+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/13dac1b6-134f-48da-8233-4258bacdcc5a/export</id>
    <title>13dac1b6-134f-48da-8233-4258bacdcc5a</title>
    <updated>2026-05-04T09:45:12.542963+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "13dac1b6-134f-48da-8233-4258bacdcc5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27730", "type": "seen", "source": "https://t.me/cibsecurity/61728", "content": "\u203c CVE-2023-27730 \u203c\n\nNginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T00:34:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/13dac1b6-134f-48da-8233-4258bacdcc5a/export"/>
    <published>2023-04-10T00:34:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9b75209-5e67-4424-825e-2fd5e52b7b7c/export</id>
    <title>d9b75209-5e67-4424-825e-2fd5e52b7b7c</title>
    <updated>2026-05-04T09:45:12.542862+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9b75209-5e67-4424-825e-2fd5e52b7b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27733", "type": "seen", "source": "https://t.me/cibsecurity/62289", "content": "\u203c CVE-2023-27733 \u203c\n\nDedeCMS v5.7.106 was discovered to contain a SQL injection vulnerability via the component /dede/sys_sql_query.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T16:42:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9b75209-5e67-4424-825e-2fd5e52b7b7c/export"/>
    <published>2023-04-17T16:42:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c5df28e5-01c6-43b5-9b02-4e51726d4a8c/export</id>
    <title>c5df28e5-01c6-43b5-9b02-4e51726d4a8c</title>
    <updated>2026-05-04T09:45:12.542756+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c5df28e5-01c6-43b5-9b02-4e51726d4a8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/cibsecurity/64342", "content": "\u203c CVE-2023-2773 \u203c\n\nA vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T22:32:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c5df28e5-01c6-43b5-9b02-4e51726d4a8c/export"/>
    <published>2023-05-17T22:32:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63eb8e97-2d2b-4ffe-9868-5893e29f397e/export</id>
    <title>63eb8e97-2d2b-4ffe-9868-5893e29f397e</title>
    <updated>2026-05-04T09:45:12.542650+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63eb8e97-2d2b-4ffe-9868-5893e29f397e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/534", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-24T14:59:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63eb8e97-2d2b-4ffe-9868-5893e29f397e/export"/>
    <published>2023-11-24T14:59:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b669c99-3304-436c-81c4-2d7e41a54369/export</id>
    <title>1b669c99-3304-436c-81c4-2d7e41a54369</title>
    <updated>2026-05-04T09:45:12.542534+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b669c99-3304-436c-81c4-2d7e41a54369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/1667", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-10T17:50:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b669c99-3304-436c-81c4-2d7e41a54369/export"/>
    <published>2023-12-10T17:50:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea91c73b-47a7-40fc-82e7-6da24afa5449/export</id>
    <title>ea91c73b-47a7-40fc-82e7-6da24afa5449</title>
    <updated>2026-05-04T09:45:12.542434+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea91c73b-47a7-40fc-82e7-6da24afa5449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/164670", "content": "https://ift.tt/U5YZCB7\nCVE-2023-27739", "creation_timestamp": "2024-01-08T22:26:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea91c73b-47a7-40fc-82e7-6da24afa5449/export"/>
    <published>2024-01-08T22:26:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042/export</id>
    <title>9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042</title>
    <updated>2026-05-04T09:45:12.542327+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/173687", "content": "https://ift.tt/YyMwGDs\nCVE-2023-27739 | easyXDM 2.5 xdm_e cross site scripting", "creation_timestamp": "2024-01-25T18:51:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042/export"/>
    <published>2024-01-25T18:51:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c815940e-7b03-4a7d-83dc-eaa23a5a7ce0/export</id>
    <title>c815940e-7b03-4a7d-83dc-eaa23a5a7ce0</title>
    <updated>2026-05-04T09:45:12.542175+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c815940e-7b03-4a7d-83dc-eaa23a5a7ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27734", "type": "seen", "source": "Telegram/w5Ik5Cw0vgMkEm06bmuObQGvOnw4PSeycmSxKauOOPaKgIyX", "content": "", "creation_timestamp": "2025-02-14T21:09:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c815940e-7b03-4a7d-83dc-eaa23a5a7ce0/export"/>
    <published>2025-02-14T21:09:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4da1af5a-4954-471a-bed3-910aa36b973b/export</id>
    <title>4da1af5a-4954-471a-bed3-910aa36b973b</title>
    <updated>2026-05-04T09:45:12.539435+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4da1af5a-4954-471a-bed3-910aa36b973b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18795", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27739\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: easyXDM 2.5 allows XSS via the xdm_e parameter.\n\ud83d\udccf Published: 2024-01-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T16:01:59.667Z\n\ud83d\udd17 References:\n1. https://threeshield.ca/easyxdm-2.5.20.html", "creation_timestamp": "2025-06-18T16:43:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4da1af5a-4954-471a-bed3-910aa36b973b/export"/>
    <published>2025-06-18T16:43:45+00:00</published>
  </entry>
</feed>
