<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T16:29:03.576812+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e4dd7ee-05ae-434f-b1d3-0e732504160c/export</id>
    <title>9e4dd7ee-05ae-434f-b1d3-0e732504160c</title>
    <updated>2026-05-06T16:29:03.955977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e4dd7ee-05ae-434f-b1d3-0e732504160c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28155", "type": "seen", "source": "https://t.me/cibsecurity/60155", "content": "\u203c CVE-2023-28155 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-16T17:31:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e4dd7ee-05ae-434f-b1d3-0e732504160c/export"/>
    <published>2023-03-16T17:31:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a7fc4c35-2b45-4f94-ba99-2080f39556e9/export</id>
    <title>a7fc4c35-2b45-4f94-ba99-2080f39556e9</title>
    <updated>2026-05-06T16:29:03.955904+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a7fc4c35-2b45-4f94-ba99-2080f39556e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28152", "type": "seen", "source": "https://t.me/cibsecurity/60652", "content": "\u203c CVE-2023-28152 \u203c\n\nAn issue was discovered in Independentsoft JWord before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T19:42:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a7fc4c35-2b45-4f94-ba99-2080f39556e9/export"/>
    <published>2023-03-24T19:42:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a976d356-783a-4d5a-9864-657102a646b8/export</id>
    <title>a976d356-783a-4d5a-9864-657102a646b8</title>
    <updated>2026-05-06T16:29:03.955825+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a976d356-783a-4d5a-9864-657102a646b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28158", "type": "seen", "source": "https://t.me/cibsecurity/61011", "content": "\u203c CVE-2023-28158 \u203c\n\nPrivilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T16:26:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a976d356-783a-4d5a-9864-657102a646b8/export"/>
    <published>2023-03-29T16:26:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f667c0d7-67f5-4cd3-bcac-1c31fed41cbe/export</id>
    <title>f667c0d7-67f5-4cd3-bcac-1c31fed41cbe</title>
    <updated>2026-05-06T16:29:03.955717+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f667c0d7-67f5-4cd3-bcac-1c31fed41cbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2815", "type": "seen", "source": "https://t.me/cibsecurity/64466", "content": "\u203c CVE-2023-2815 \u203c\n\nA vulnerability classified as critical was found in SourceCodester Online Jewelry Store 1.0. Affected by this vulnerability is an unknown functionality of the file supplier.php of the component POST Parameter Handler. The manipulation of the argument suppid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229429 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T20:33:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f667c0d7-67f5-4cd3-bcac-1c31fed41cbe/export"/>
    <published>2023-05-19T20:33:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f642ff3-cf0d-4a56-81a8-80dbd52ea804/export</id>
    <title>4f642ff3-cf0d-4a56-81a8-80dbd52ea804</title>
    <updated>2026-05-06T16:29:03.953659+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f642ff3-cf0d-4a56-81a8-80dbd52ea804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28153", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1890", "content": "Multiple Vulnerabilities in Kiddoware Kids Place Parental Control Android App (CVE-2023-28153, CVE-2023-29078, CVE-2023-29079)\n1) Login and registration returns password as MD5 hash\n2) Stored XSS via device name in parent Dashboard\n3) Possible CSRF attacks in parent Dashboard \n4) Arbitrary File Upload to AWS S3 bucket\n5) Disable Child App Restriction without Parent's notice\nhttps://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/", "creation_timestamp": "2023-06-27T08:54:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f642ff3-cf0d-4a56-81a8-80dbd52ea804/export"/>
    <published>2023-06-27T08:54:53+00:00</published>
  </entry>
</feed>
